Ch.6 Flashcards

1
Q

Which feature in web browsers will prevent pop-ups from launching?

A

pop-up blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

According to the A+ exam guide, what are the steps in malware removal?

A
  1. Identify and research malware symptoms.
  2. Quarantine the infected systems.
  3. Disable System Restore (in Windows).
  4. Remediate the infected systems.
  5. Update the anti-malware software.
  6. Scan and use removal techniques (safe mode, pre-installation environment).
  7. Schedule scans and run updates.
  8. Enable System Restore and create a restore point (in Windows).
  9. Educate the end user.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

According to the A+ exam guide, what is the first step in malware removal?

A

Identify and research malware symptoms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to the A+ exam guide, what is the last step in malware removal?

A

Educate the end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

After malware removal, why should you educate the end user?

A

to prevent future malware infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should you do if a user needs an administrative password to install a program on his computer?

A

Enter the password yourself and install the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why should you not store passwords in a text file on your desktop?
.

A

Someone can open the file and read your passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a retinal scanner do?

A

It uses a laser to scan the blood vessels in the back of the eye to authenticate a person’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the acronym NAC denote?

A

network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In iOS, which feature is responsible for locating and remotely wiping lost devices?

A

the Find My iPhone feature in iCloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a locator application?

A

an application that helps locate a mobile device when it is stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three recycling or repurposing methods listed on the A+ exam guide?

A

Low-level format vs. standard format
Overwrite
Drive wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should you configure when setting up a wireless connection?

A

Configure the SSID and decide which encryption standard to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you ensure that your SSID is not seen by computers in other offices?

A

Do not broadcast the SSID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What occurs when MAC filtering is enabled on a wireless access point?

A

The MAC address of each network interface card (NIC) that attempts to connect to the network is checked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two default elements should you change to secure a newly configured wireless network from unauthorized access?

A

password and SSID

17
Q

What happens when MAC filtering is enabled on a wireless network?

A

Only MAC addresses that are specifically allowed connection are granted connection.

18
Q

Which three protocols provide encrypted communications between 802.11x wireless clients and wireless access points?

A

Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2

19
Q

Why does WPA use Temporal Key Integrity Protocol (TKIP)?

A

to ensure that a new encryption key is provided for every packet that is sent

20
Q

What does the acronym WPA denote?

A

Wireless Protected Access

21
Q

What does the acronym WEP denote?

A

wired equivalent privacy

22
Q

What does three-factor authentication use?

A

something you know (i.e. username or password), something you have (i.e., smart card), and something you are (i.e., biometric authentication)

23
Q

Which wireless security protocol is most secure: WPA, WPA2, or WEP?

A

WPA2