6.2 Explain methods to secure devices and best practices. Flashcards

1
Q

What should be done if a needed device driver has been “abandoned” by the original manufacturer?

A

Search forums and other sites for information that may, or may not, legitimize a third-party’s driver package.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For security purposes, what piece of information should be changed immediately when setting up a wireless router?

A

Administrator password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A software firewall that is capable of content filtering can perform what action?

A

Allow or deny specific attachment and payload types, keywords, and file formats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of patching systems?

A

To harden systems by keeping operating system files, driver software, and firmware updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are notified that your computer has a worm that is actively replicating across the network. What should you do first?

A

Disconnect the network link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If someone refers to an application as “bloatware,” what are they saying about it?

A

The program consumes an excessive amount of system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the general term for any unwanted software that has the potential to damage a system or impede performance?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After you finish installing a fresh copy of Windows, you notice that several unnecessary applications were automatically installed as part of a bundle with the operating system. What should you do?

A

Uninstall any unnecessary applications by using the uninstall feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What action can be taken to help validate that software comes from a legitimate source?

A

Ensuring that driver software is digitally signed by the vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is NOT a legitimate source for obtaining setup files or device drivers?

A

Third-party sites such as download.cnet.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

After antivirus software detects a virus, what action does the software most commonly take next?

A

It quarantines the virus and prevents it from being opened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What typically happens when you visit a website that does not have a valid digital certificate?

A

The browser will display an invalid certificate warning and ask if you want to proceed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly