Chapter 10 Flashcards

1
Q

What is the benefit of device hardening?

A

Helps to protect your computer by reducing it’s vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 categories that device hardening techniques fall into?

A

1-Updating devices and using system passwords
2-Protecting against network threats
3-Removing and disabling software services
4-Browsing the internet safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 classes of applications to help protect your system?

A

Antivirus software
Anti spyware software
Anti spam software
Software firewall - block potential dangerous network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or false their are Suites that have multiple security functiond

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a MD5

A

Message Digest Version 5. Created by an Antivirus program for each application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a change in the MD5 means

A

Treat as a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do antivirus software identify viruses

A

By scanning all files on the hard disk or a subset of files that are most likely to contain virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are spams?

A

Unwanted junk mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is used to manage spam

A

Filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you get to the built in update mechanisms on Windows?

A

Start
Settings
Update security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you get to the built in update mechanisms on an Apple?

A

Settings

General

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you get to the built in update mechanisms an Android?

A

Settings
About phone
System updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MD5?

A

Message Digest Version 5

A math calculation that results in a unique value used to reflect the data being checked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between deleting and quarantine?

A

Delete removed

Quarantine places it in an off limits area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name of the anti spyware tool that comes with Windows?

A

Windows Defender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When are anti spyware applications most effective?

A

When their definitions are up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Steps to diagnosing and fixing malware infection

A
  • Identify the malware symptoms
  • Quarantine the infected system
  • Remediate infected systems
  • Schedule scans and updates
  • Educate the end user to avoid a repeat performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Where on your PC can you track CPU and memory usage?

A

Task manager

Performance

19
Q

If you cannot use your local antivirus program what can you do?

A

Use an online virus checker

20
Q

If your system is infected to the point that it won’t operate what can you do?

A

Boot into the Windows recovery environment or safe mode with networking

21
Q

What are the 2 different types of firewalls?

A

Network based

Host based

22
Q

What is the name of Windows own host based firewall?

A

Windows Firewall

23
Q

How is uninstallation best handled in the Windows system?

A

Through the Programs and features option in Control Panel and Windows
Click Uninstall

24
Q

What is clean uninstallation?

A

Using the uninstall option.

25
What should you do when you receive unsolicited pop up messages on your cellphone in a crowed area?
Disable Bluetooth from the settings option on iPhones and Androids Or Enable airplane mode
26
To prevent the possibility of a security hole which communication methods can you disable?
Bluetooth Near field communication (NFC) Other unused services
27
What are the key points to browsing the internet safely?
Keep your browser up to date Manage plugins, add one, toolbars and extension Manage security settings properly Know how to recognize secure websites
28
Where do you find the auto fill settings?
Chrome Settings Advanced settings Passwords
29
How do web browsers work?
By downloading and displaying web pages which are basically programming scripts.
30
What are 2 basic safe web browsing tip?
Do not visit questionable sites | Limit the use of personal identifiable information
31
List tips to recognize suspicious sites.
1 Look for signs of security 2 look for websites with incorrect spelling 3 communications with incorrect spelling and grammar 4 threats 5 deals that are too good to be true
32
What is the phishing protection filter on Microsoft based browsers?
Smartscreen filter ***In windows 10 it's Incorporated in Windows Defender **Google chrome also has a built in phishing protection ( settings. Show advanced settings privacy and security
33
How do you protect your when using Public computers?
1 don't enter any personal information 2 no confidentiality info 3 disable autofill 4 Don't save files to that computer Delete browsing history, cache, and cookies after you are finished 5 always pay attention to your surroundings
34
What are the 3 types of accounts?
Admin/Administrator/root(on UNIX and Linux) User Guests
35
Do power users have full total admin control?
No
36
What is prohibited content policy or acceptable use policy
Written policies and procedures identifying actions that are appropriate and the consequences for performing those actions
37
What are weak passwords?
Passwords that are easy to guess
38
What is a cipher text
A text which has been encrypted
39
What are the 2 levels at which you can encrypt data on a hard drive?
At the file level | At the disk level
40
What needs to happen for data to be encrypted in transit?
Both systems need to support the same encryption technology
41
Give examples of where data is encrypted in transit.
Email Internet browsing Virtual private network (VPN) Mobile application
42
What does PII represent?
Personally identifiable information
43
Should data in transit be encrypted?
Yes