Chapter 10 Flashcards

1
Q

What do you call the process that tries every combination of characters, numbers, or symbols until a password is guessed?

Man in the middle

Random guessing

Brute force

Blogging

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To configure password settings such as a minimum password age or a password must meet Complexity Requirements, you use __________.

Registry editor

Group policies

Users console

Computer Management console

A

Group Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a credit card-like device that contains a chip on which is stored a digital certificate that helps identify a particular user?

Card vault

Card lock pick

Card unlocker

Smart card

A

Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which command enables you to execute a command as an administrator while logged in as a standard user?

Context

Run as

Profile

Net only

A

Run as

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A(n) _____________ is a software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others.

Anti-virus software package

Defender

Net blocker

Firewall

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a type of software that gathers information about computer users and transmits it back to the attacker?

Spyware

Trojan horse

Polymorphic virus

Boot sector virus

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When Windows Defender is updated, it updates its ___________ so that it knows how to detect and deal with new spyware.

Logs

Monitors

Definitions

Connections

A

Definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ________________ is a feature of NTFS that encrypts the files on a computer so that even if an intruder can obtain a file, he is unable to read it.

Public key

Digital reader

Encrypting File System

NTFS compression

A

Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following does NOT weaken the effectiveness of a password?

Short passwords

Unchanging passwords

Random characters

Predictable passwords

A

Random characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network that uses two forms of authentication. For example, a smart card combined with a password.

A

Multifactor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A software program that tries all of the possible passwords until it finds the right one

A

Brute Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refers to a feature that enables you to display rules according to the profile they apply to, their current state, or the group to which they belong

A

Filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A collective reference term for malicious software created specifically for the purpose of infiltrating or damaging a computer system without the user’s knowledge or consent (includes viruses, trojan horses, worms, spyware and adware)

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A rule configured to allow traffic only when the connection between the communicating computers is secured using IPsed

A

Authenticated Exception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A National Institute of Standards standard for identification verification.

A

Personal Identity Verification (PIV)

17
Q

A key used to decrypt an encryption certificate

A

Private Key

18
Q

A key used to encrypt a file

A

Public Key

19
Q

You can allow programs through a firewall using inbound or outbound ______.

A

rules

20
Q

A type of software that gathers information about computer users and transmits it back to the attacker

A

Spyware

21
Q

Policies that define specific operating system functions

A

User Rights

22
Q

Component included in Windows 7 that provides a core biometric functionality and a similar device control panel

A

Windows Biometric Framework

23
Q

Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets?

a. Increase the Enforce Password History value
b. Enable the Password Must Meet Complexity Requirements setting
c. Decrease the Account Lockout Threshold value
d. Disable the Store Passwords Using Reversible Encryption policy

A

d. Disable the Store Passwords Using Reversible Encryption policy

24
Q
  1. Which of the following mechanisms is most often used in firewall rules to allow

traffic onto the network?

a. Hardware addresses
b. IP addresses
c. Protocol numbers
d. Port numbers

A

d. Port numbers

25
Q

Which of the following NTFS features is incompatible with EFS encryption?

a. Compression
b. IPsec
c. Permissions
d. Parental controls

A

a. Compression

26
Q

Which of the following command line parameters will prevent a program executed

using Runas.exe from accessing the elevated user’s encrypted files?

a. /env
b. /noprofile
c. /showcred
d. /profile

A

b. /noprofile

27
Q

Which of the following actions can you NOT perform from the Windows Firewall control panel? (Choose all that apply.)

a. Allow a program through the firewall in all three profiles.
b. Manage firewall exceptions for the domain profile.
c. Create firewall exceptions based on port numbers.
d. Turn Windows firewall off for all three profiles.

A

a. Allow a program through the firewall in all three profiles.
c. Create firewall exceptions based on port numbers.

28
Q

Which of the following policy modifications would make it harder for intruders to penetrate user passwords by a brute force attack? (Choose all that apply.)

a. Increase the value of the Reset Account Logon Counter After policy.
b. Enable the Password Must Meet Complexity Requirements policy.
c. Increase the Account Lockout Threshold value.
d. Reduce the value of the Minimum Password Age policy.

A

a. Increase the value of the Reset Account Logon Counter After policy.
b. Enable the Password Must Meet Complexity Requirements policy.

29
Q

Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?

a. EFS
b. IPsec
c. UAC
d. PIV

A

b. IPsec

30
Q

Which of the following statements about Windows Defender is true?

a. Windows Defender uses rules that you create to control its scans.
b. Windows Defender can detect spyware that is already present on the system, but it cannot prevent the infiltration of new spyware.
c. Windows Defender eliminates the need for third-party anti-virus software.
d. Windows Defender receives updates that are supplied free with the regularly scheduled Windows Update downloads.

A

d. Windows Defender receives updates that are supplied free with the regularly scheduled Windows Update downloads.

31
Q

Which of the parental controls has been removed from Windows 7?

a. Application restrictions
b. User time limits
c. Restricted access to games
d. Internet filtering

A

d. Internet filtering

32
Q

The built-in local groups on a Windows 7 workstation receive their special

capabilities through which of the following mechanisms?

a. Parental controls
b. Windows firewall rules
c. NTFS permissions
d. User rights

A

d. User rights