Chapter 10 Flashcards

1
Q

What is the benefit of device hardening?

A

Helps to protect your computer by reducing it’s vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 categories that device hardening techniques fall into?

A

1-Updating devices and using system passwords
2-Protecting against network threats
3-Removing and disabling software services
4-Browsing the internet safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 classes of applications to help protect your system?

A

Antivirus software
Anti spyware software
Anti spam software
Software firewall - block potential dangerous network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or false their are Suites that have multiple security functiond

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a MD5

A

Message Digest Version 5. Created by an Antivirus program for each application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a change in the MD5 means

A

Treat as a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do antivirus software identify viruses

A

By scanning all files on the hard disk or a subset of files that are most likely to contain virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are spams?

A

Unwanted junk mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is used to manage spam

A

Filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you get to the built in update mechanisms on Windows?

A

Start
Settings
Update security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you get to the built in update mechanisms on an Apple?

A

Settings

General

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you get to the built in update mechanisms an Android?

A

Settings
About phone
System updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MD5?

A

Message Digest Version 5

A math calculation that results in a unique value used to reflect the data being checked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between deleting and quarantine?

A

Delete removed

Quarantine places it in an off limits area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name of the anti spyware tool that comes with Windows?

A

Windows Defender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When are anti spyware applications most effective?

A

When their definitions are up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Steps to diagnosing and fixing malware infection

A
  • Identify the malware symptoms
  • Quarantine the infected system
  • Remediate infected systems
  • Schedule scans and updates
  • Educate the end user to avoid a repeat performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Where on your PC can you track CPU and memory usage?

A

Task manager

Performance

19
Q

If you cannot use your local antivirus program what can you do?

A

Use an online virus checker

20
Q

If your system is infected to the point that it won’t operate what can you do?

A

Boot into the Windows recovery environment or safe mode with networking

21
Q

What are the 2 different types of firewalls?

A

Network based

Host based

22
Q

What is the name of Windows own host based firewall?

A

Windows Firewall

23
Q

How is uninstallation best handled in the Windows system?

A

Through the Programs and features option in Control Panel and Windows
Click Uninstall

24
Q

What is clean uninstallation?

A

Using the uninstall option.

25
Q

What should you do when you receive unsolicited pop up messages on your cellphone in a crowed area?

A

Disable Bluetooth from the settings option on iPhones and Androids
Or
Enable airplane mode

26
Q

To prevent the possibility of a security hole which communication methods can you disable?

A

Bluetooth
Near field communication (NFC)
Other unused services

27
Q

What are the key points to browsing the internet safely?

A

Keep your browser up to date
Manage plugins, add one, toolbars and extension
Manage security settings properly
Know how to recognize secure websites

28
Q

Where do you find the auto fill settings?

A

Chrome
Settings
Advanced settings
Passwords

29
Q

How do web browsers work?

A

By downloading and displaying web pages which are basically programming scripts.

30
Q

What are 2 basic safe web browsing tip?

A

Do not visit questionable sites

Limit the use of personal identifiable information

31
Q

List tips to recognize suspicious sites.

A

1 Look for signs of security
2 look for websites with incorrect spelling
3 communications with incorrect spelling and grammar
4 threats
5 deals that are too good to be true

32
Q

What is the phishing protection filter on Microsoft based browsers?

A

Smartscreen filter

***In windows 10 it’s Incorporated in Windows Defender

**Google chrome also has a built in phishing protection ( settings. Show advanced settings privacy and security

33
Q

How do you protect your when using Public computers?

A

1 don’t enter any personal information
2 no confidentiality info
3 disable autofill
4 Don’t save files to that computer
Delete browsing history, cache, and cookies after you are finished
5 always pay attention to your surroundings

34
Q

What are the 3 types of accounts?

A

Admin/Administrator/root(on UNIX and Linux)
User
Guests

35
Q

Do power users have full total admin control?

A

No

36
Q

What is prohibited content policy or acceptable use policy

A

Written policies and procedures identifying actions that are appropriate and the consequences for performing those actions

37
Q

What are weak passwords?

A

Passwords that are easy to guess

38
Q

What is a cipher text

A

A text which has been encrypted

39
Q

What are the 2 levels at which you can encrypt data on a hard drive?

A

At the file level

At the disk level

40
Q

What needs to happen for data to be encrypted in transit?

A

Both systems need to support the same encryption technology

41
Q

Give examples of where data is encrypted in transit.

A

Email
Internet browsing
Virtual private network (VPN)
Mobile application

42
Q

What does PII represent?

A

Personally identifiable information

43
Q

Should data in transit be encrypted?

A

Yes