Ch16 Security Flashcards

1
Q

Virus

A

Code that runs on a computer without the user’s knowledge; it infects the computer when code is accessed and executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm

A

Similiar to viruses except that it self-replicates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan Horse

A

Appears to perform legitimate function but are actually performing malicious functions behind the scenes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware

A

Malicious software either downloaded unwittingly from a website or installed along with some other third-party software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rootkit

A

Software designed to gain administrator-level control over a computer system without being detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spam

A

The abuse of electronic messaging systems such as e-mail, broadcast media, and instant messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Clearing

A

Removal of data with a certain amount of assurance that it cannot be reconstructed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Purging

A

aka sanitizing; removal of data done in such a way that the data cannot be reconstructed. may use bit-level erasure software to completely destroy all data on the media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of malware self-replicates

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of malware is the abuse of electronic messaging systems?

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List three symptons of viruses?

A
  1. Computer runs slowly.
  2. Computer lock ups.
  3. Unusual error messages are displayed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the science of recognizing humans based on physical characteristics?

A

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hard drive needs to be disposed of in a way so taht no one can access the data.

Which method should you use?

A

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which is the best mode to use when scanning for viruses?

A

safe mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are five ways to prevent spyware?

A
  1. Adjust Internet Explorer security settings.
  2. Install antispyware software.
  3. Uninstall unnecessary applications and services.
  4. Educate users on how to surf the web safely.
  5. Consider technologies that discourage spyware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One of your customers tells you that a bank employee called and asked for the person’s bank balance and telephone number.

What is this an example of?

A

Social Engineering

17
Q

Turn on User Account Control in Win 7

A

Start >> Control Panel >> User Accounts and Family Safety >> User Accounts >> click Change User Account Control settings link.

18
Q

Four levels of Win 7 UAC

A
  1. Always Notify
  2. Default: Notify Me Only When Programs Try to Make Chances to My Computer.
  3. Notify Me Only When Programs Try to Make Changes to My Computer (Do Not Dim My Desktop)
  4. Never Notify - Shuts off UAC
19
Q

Where are NTFS permissions found?

A

Security Tab of the folder’s Properties Window.

20
Q

Two Components Needed for BitLocker Encryption

A
  1. Trusted Platform Module - Chip on motherboard that stores encrypted keys or external USB key to store the encrypted keys.
  2. Hard drive with two volumes, preferably created during installation of Windows.
21
Q

Why does BitLocker need two volumes on a hard drive?

A

One volume is needed for the operating system that will be encrypted, the other volume is the active volume that remains unencrypted so the computer can boot.

22
Q

Name a common security component of Win7/Vista?

A

User Account Control (UAC)

23
Q

A user complains that while away at lunch someone used his computer to send e-mails to other co-workers without his knowledge. What should you recommend?

A

Use the Windows Lock feature.

24
Q

What best describes encryption?

A

Prevents unauthorized users from viewing or reading data.

25
Q

One of the user’s on your network is trying to access files shared on a remote computer. The file’s share permissions allow the user full control. But, the NTFS permissions allow the user Read access.

What will be the resulting access for the user ?

A

Read access.

26
Q
  1. You are the administrator for your network. You set up an administrative share called Data$. What is necessary for another user to access this share ?(Two Possible answers)
A
  1. The user must have permissions to access the share.
  2. The user must know the exact network path to the share.
27
Q

WEP Description / Encryption Level

A
  1. Wired Equivelant Privacy
  2. 64 bit
28
Q

WPA Description / Encryption Level

A
  1. Wi-Fi Protected Access
  2. 128 bit
29
Q

WPA2 Description / Encryption Level

A
  1. Wi-Fi Protected Access v2
  2. 256 bit
30
Q

TKIP Description / Encryption Level

A
  1. Temporal Key Integrity Protocol - deprecated used with WEP / WPA
  2. 128 bit
31
Q

CCMP Description / Encryption Level

A
  1. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol; used with WPA2
  2. 128 bit
32
Q

AES Description / Encryption Level

A
  1. Advanced Encryption Standard; used with WPA/WPA2
  2. 128, 192, and 256 bit
33
Q

Seven Ways to Secure SOHO Routers

A
  1. Change default passwords
  2. Changing / Disabling the SSID
  3. Configuring Wireless Encryption
  4. Enabling MAC Filtering
  5. Disabling WPS
  6. Assigning Static IP Addresses
  7. Disabling physical ports.
34
Q

What describes the attempt to guess a password by using a combination of letters and numbers?

A

Brute Force

35
Q

List three ways to help secure a SOHO Router

A
  1. Change default passwords
  2. Enable MAC filtering
  3. Enable WPA2
36
Q

What is the strongest form of wireless encryption?

A

AES

37
Q

You want to prevent rogue employees from connecting a laptop to the SOHO router and accessing the network. List two ways to accomplish this.

A
  1. Enable MAC filtering
  2. Disable physical port.