6. Securing Devices and Data Flashcards
Which feature in web browsers will prevent pop-ups from launching?
pop-up blocker
According to the A+ exam guide, what are the steps in malware removal
- Identify and research malware symptoms
- Quarantine the infected systems
- Disable System Restore (in Windows)
- Remediate the infected systems
- Update the anti-malware software
- Scan and use removal techniques (safe mode, pre-installation environment)
- Schedule scans and run updates
- Enable System Restore and create a restore point (in Windows)
- Educate the end user
According to the A+ exam guide, what is the first step in malware removal
Identify and research malware symptoms
According to the A+ exame guide, what is the last step in malware removal
Educate the end user
After malware removal, why should you educate the end user?
to prevent future malware infection
What should you do if a user needs an administrative password to install a program on his computer?
Enter the password yourself and install the program
Why should you not store passwords in a text file on your desktop
Someone can open the file and read your passwords
What does a retinal scanner do
It uses a laser to scan the blood vessels in the back of the eye to authenticate a person’s identity
What does the acronym NAC denote
network access control
In iOS, which feature is responsible for locating and remotely wiping lost devices?
the Find My iPhone feature in iCloud
What is a locator application
An application that helps locate a mobile device when it is stolen
What are the three recycling or repurposing methods listed on the A+ exam guide
- Low-level format vs standard format
- Overwrite
- Drive wipe
What should you configure when setting up a wireless connection?
Configure the SSID and decide which encryption standard to use
How can you ensure that your SSID is not seen by computers in other offices?
Do not broadcast the SSID
What occurs when MAC filtering is enabled on a wireless access point
The MAC address of each network interface card (NIC) that attempts to connect to the network is checked.
Which two default elements should you change to secure a newly configured wireless network from unauthorized access?
password and SSID
What happens when MAC filtering is enabled on a wireless network
Only MAC addresses that specifically allowed connection are granted connection
Which three protocols provide encrypted communications between 802.11x wireless clients and wireless access points
- Wired Equivalent Privacy (WEP)
- Wi-Fi Protected Access (WPA)
- WPA2
Why does WPA use Temporal Key Integrity Protocol (TKIP)
to ensure that a new encryption key is provided for every packet that is sent
What does the acronym WPA denote
Wireless Protected Access
What does the acronym WEP denote
Wired equivalent privacy
What does three-factor authentication use
- Something you know (username, password)
- Something you have (smart card)
- and something you are (biometric authentication)
Which wireless security protocol is more secure: WPA, WPA2, or WEP
WPA2
BitLocker
An entire volume encryption feature included with Windows Vista and Windows 7 Ultimate and Enterprise editions, and Windows 8 and higher Professional and Enterprise editions
BitLocker-To-Go
A BitLocker component used to protect removal drives, such as USB flash drives
Degausser
A device which uses powerful electromagnets to destroy all data on magnetic media like tapes and hard drives, but not optical or flash storage
Encrypting File System (EFS)
A file system which allows encryption of individual drives and folders on any NTFS volume
Event Viewer
A tool used to detect and diagnose unusual system behavior
Rescue Disk
A combination of antimalware and system repair tools on a bootable disc or flash drive
Trusted Platform Module (TPM)
A microchip installed on the motherboard of desktop and portable computers, which stores critical encryption keys in hardware inaccessible to the operating system of most attackers
TPM
Trusted Platform Module