Chapt 10 Flashcards

1
Q

to harden a device, you can disable the communications features such as ________ and _______.

A

bluetooth and NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the key combination of ________ lets a user lock their computer when they leave

A

win + L or ctrl alt del

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

________ is the process of scrambling the data in user files so that others cannot read them

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

to protect a computer against viruses and spyware, install _______.

A

anti malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the three types of accounts on a computer are what?

A

guest, admin, and standard user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the ______ user account should be disabled for security purposes unless it is being used

A

guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

passwords should not be ______ among different websites.

A

reused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

many companies will have passwords ______ periodically as part of a security policy.

A

expire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the process of providing proper credentials to access a computer resource is called _________.

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

risks of using public workstations include what three things?

A

shoulder surfing, keyloggers ( or other malware), unsecured wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_________ wifi networks are unsecure and should not be used.

A

open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what should be true about a web browser’s version before you use it?

A

should be the most current version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the name of the feature that completes your name and address for you in web pages?

A

auto fill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the name of a file a website downloads to your computer to identify you?

A

cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are two ways to identify a secure website?

A

https and the lock symbol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are three symptoms of adware?

A

pop ups, browser redirection, search engine redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

to protect your security, you should limit the use of _______ on the internet.

A

personally identifiable information (PII)

18
Q

you are using chrome, and you want to ensure that when you type in your first name to a web page, all of your other information fills in the fields for you. what should you do?

enable cache, enable incognito, enable autofill, enable cookies

A

enable autofill

19
Q

you have been asked to give training on network security. for your section on password management, which options should you recommend to users? choose two:

a) use the same password on multiple systems so that they are easy to remember
b) do not reuse the same password after you are required to change it.
c) do not use complex passwords because they are easy to forget.
d) change default passwords on systems

A

b) do not reuse the same password after you are required to change it.

d) change default passwords on systems

20
Q

what option can you configure on your workstation to increase security when you leave your desk?

screensaver password, file encryption, multifactor authentication, single sign on

A

screen saver password

21
Q

claire is browsing the internet and wants to know whether its safe to enter her credit card info into a website. what do you tell her to look for

SSL:// TLS:// HTTPS:// HTTP://

A

HTTPS://

22
Q

which of the following types of data should be considered confidential and handled appropriately? choose two.

financial info, social networking, customer info, contact info

A

financial info, customer info

23
Q

you have just landed at an airport and have an unexpected six hour layover. you want to use your smartphone to get some work done. what should you disable as a precautionary device hardening measure to help prevent potential attacks? choose two:

NFC, Bluetooth, Autofill, FFC

A

NFC, Bluetooth

24
Q

your coworker rachel has recently discovered that when she starts typing her name into a field in a web browser, her whole name appears as well as her address in the appropriate boxes. what is this due to?

autofill, adware infection, single sign on, suspicious hyperlinks

A

autofill

25
Q

which of the following actions are considered as web browsing best practices? choose three:

disabling autofill, limiting the use of PII, updating plugins and toolbars, closing untrusted source warnings

A

disabling autofill, limiting the use of PII, updating plugins and toolbars

26
Q

you have remotely logged into your corporate network. which of the following is used to ensure encryption of data in transit between your laptop and corporate servers?

email encryption
HTTPS
Host firewall
VPN

A

VPN

27
Q

due to a recent string of theft in your office, you need to harden your local system. what two actions are most appropriate for your situation?

enable encryption
install anti-malware
disable unused services
install a hardware lock

A

enable encryption, install a hardware lock

28
Q

you enabled file encryption on your local computer. while you were on vacation, one of your co-workers managed to get onto your computer and share your important files with other users. how did they do this?

a) they logged on with your username and password
b) all users logging into the system have access to encrypted files
c) they used the disk recovery tool to access the encrypted files.
d) they logged on and disabled encryption

A

a) they logged on with your username and password

29
Q

you just read an article about an internet worm recently causing problems. what type of software should you install to protect yourself from this worm?

antivirus, antispyware, software firewall, anti spam

A

antivirus

30
Q

your manager just got a new workstation and is not part of a domain. he wants to know which user accounts he should disable to increase security. what should you tell him to disable?

admin, guest, user, power user

A

guest

31
Q

which of the following statements is true regarding web browser plugins, toolbars and extensions?

a) they are dangerous and should be deleted
b) they should be updated to the newest versions
c) they only function in microsoft edge or internet explorer
d) they will be detected and removed by antivirus software

A

b) they should be updated to the newest versions

32
Q

you recieve an email in your inbox from your friend sara. the title of the email is “this is so cool!” and inside the email is an attachment with an .exe extension. what should you do?

click the attachment
run virus scan, then click the attachment
call sara to see if she sent you the email
delete the email

A

call sara to see if she sent you the email

33
Q

which type of software will help protect your computer from malicious network traffic?

software firewall, password complexity tool, anti spyware, antivirus

A

software firewall

34
Q

you are in a library that has free computers to use for internet browsing. which of the following should you possibly be concerned about? chose all that apply

software firewall
shoulder surfing
keyloggers
unsecured wireless network

A

shoulder surfing
keyloggers
unsecured wireless network

35
Q

which of the following are considered characteristics of a strong password? choose two:

uses patterns
uses symbols, numbers and letters
contains PII
long

A

uses symbols, numbers and letters

long

36
Q

you recently recieved a new workstation and need to secure it properly before browsing the internet. which actions should you take? choose two:

a) install antivirus
b) upgrade your browser
c) enable acceptance of cookies
d) enable autofill

A

a) install antivirus
b) upgrade your browser

37
Q

the managers at your company have decided to implement stricter security policies on the company’s local network. which of the following should they do? choose two:

a) enable HTTPS on the corporate web server
b) disable host firewalls
c) develop written policies and procedures
d) enforce password policies

A

c) develop written policies and procedures
d) enforce password policies

38
Q

which of the following is NOT a category of a device hardening technique?

A) protecting against network threats
B) updating devices and using system passwords
C) adding and enabling software and services
D) browsing the internet safely

A

C adding and enabling software and services

Device Hardening Techniques:
- updating devices and using system passwords
- protecting against network threats
- removing and disabling software and services
- browsing the internet safely

39
Q

which of the following actions can you take to increase the security of your web browser? choose all that apply.

A) disable autofill
B) enable SSL
C) enable cookies
D) upgrade browser to the newest version

A

A) Disable autofill
D) upgrade browser to the newest version

incorrect B) SSL is used by secure websites, but it is not something you enable on a client computer.

40
Q

which of the following statements are true of the user account? choose 2.

A) this account is used to prevent unauthorized changes to a computer
B) this type of account makes changes that will affect other operator
C) this account is created by default and it should be disabled
D) this account can essentially do anything on the computer

A

A, B