Chapter 17: Security Concepts Flashcards
Cable locks are used to secure laptops and any device with a ____.
USS or Universal Security Slot
The ____, also known as a metal detector, uses an electromagnetic field to detect metallic objects.
magnetometer
Microsoft’s Active Directory (AD) uses a protocol called ____ to quickly look up objects, such as users, computers, and printers.
LDAP or Lightweight Directory Access Protocol
Microsoft’s Active Directory (AD) works in conjunction with ____, which is the protocol that performs the authentication of users.
Kerberos
Microsoft’s Active Directory (AD) uses a directory partition called the ____ to describe classes of objects and the attributes that define each object.
schema partition
A/An ____ virus is designed to make itself difficult to detect or analyze by covering themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus.
armored
A/An ____ virus infects the Master Boot Record (MBR) of a hard disk an loads when the computer boots and can re-infect an operating system.
boot sector
A/An ____ virus attaches itself to legitimate programs and then creates a program with a different filename extension.
companion
A/An ____ virus exploits the enhancements made to many application programs.
macro
A/An ____ virus attacks your system in multiple ways.
multipartite
A/An ____ virus alters programs and databases, and the only way to remove this virus is to reinstall the programs that are infected. If you miss even a single instance of this virus on the victim system, the process will start again and infect the system once more.
phage
A/An ____ virus will change form to avoid detection and attempt to hide from your antivirus software.
polymorphic
A/An ____ bypasses the antivirus software installed on a computer and can directly attack your antivirus software and potentially destroy the virus definition database file.
retrovirus
A/An ____ virus attempts to avoid detection by masking itself from applications. When a system utility or program runs, it redirects commands around itself to avoid detection.
stealth
A/An ____ is different from a virus in that it can reproduce itself, it’s self-contained, and it doesn’t need a host application to be transported.
worm