Chapter 10 Flashcards
What do you call the process that tries every combination of characters, numbers, or symbols until a password is guessed?
Man in the middle
Random guessing
Brute force
Blogging
Brute force
To configure password settings such as a minimum password age or a password must meet Complexity Requirements, you use __________.
Registry editor
Group policies
Users console
Computer Management console
Group Policies
What is a credit card-like device that contains a chip on which is stored a digital certificate that helps identify a particular user?
Card vault
Card lock pick
Card unlocker
Smart card
Smart card
Which command enables you to execute a command as an administrator while logged in as a standard user?
Context
Run as
Profile
Net only
Run as
A(n) _____________ is a software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others.
Anti-virus software package
Defender
Net blocker
Firewall
Firewall
Which of the following is a type of software that gathers information about computer users and transmits it back to the attacker?
Spyware
Trojan horse
Polymorphic virus
Boot sector virus
Spyware
When Windows Defender is updated, it updates its ___________ so that it knows how to detect and deal with new spyware.
Logs
Monitors
Definitions
Connections
Definitions
The ________________ is a feature of NTFS that encrypts the files on a computer so that even if an intruder can obtain a file, he is unable to read it.
Public key
Digital reader
Encrypting File System
NTFS compression
Encrypting File System
Which of the following does NOT weaken the effectiveness of a password?
Short passwords
Unchanging passwords
Random characters
Predictable passwords
Random characters
A network that uses two forms of authentication. For example, a smart card combined with a password.
Multifactor Authentication
A software program that tries all of the possible passwords until it finds the right one
Brute Force
Refers to a feature that enables you to display rules according to the profile they apply to, their current state, or the group to which they belong
Filter
A software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others
Firewall
A collective reference term for malicious software created specifically for the purpose of infiltrating or damaging a computer system without the user’s knowledge or consent (includes viruses, trojan horses, worms, spyware and adware)
Malware
A rule configured to allow traffic only when the connection between the communicating computers is secured using IPsed
Authenticated Exception