Chapter 28 Review: Securing Computers Flashcards

1
Q

What type of attack is represented by a hacker changing their MAC address to match the server, causing the router to adjust MAC address tables accordingly?

A

Address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of network matches the following firewall settings?

Enables you to share resources, discover other devices, and allow other devices to discover your computer

A

Private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of network matches the following firewall settings?

Prevents your computer from sharing and disables all discovery protocols

A

Guest or Public Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of network matches the following firewall settings?

The controller on the network tells your machine what it can and cannot share

A

Domain Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Laptops are easily stolen. One of the easiest ways to physically protect your laptop is with a _______

A

Cable lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of virus that changes its signature to varied, but operational copies of itself to prevent detection is a _____ virus

A

Polymorph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user logs in with a user name and password, and then a numeric key on a fob he possesses. What type of authentication is this?

A

Two factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _____ is carried around by a user and contains a series of numbers that changes from time to time that can be used to access a secure location

A

Security Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ is when your computer is locked or your data is encrypted until you pay a certain amount of money to a hacker

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The _______ states that user accounts should have permission to access only the resources they need and no more

A

Principle of least privilige

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of malware is this?

Often hides until it can be activated by human action, possibly stealing information

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of malware is this?

Program that takes advantage of very low level operating system functions to hide itself

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of malware is this?

Replicates on its own through hardware or through networks

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of malware is this?

A network of infected computers under the control of a person or a group

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of malware is this?

Encrypts data on a hard drive and then demands money to decrypt the data

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of malware is this?

Malware that appears to be something beneficial but usually has evil intent

A

Trojan Horse

17
Q

A _____ protects an internal network from unauthorized access to and from the Internet by hiding addresses and blocking ports

A

Firewall

18
Q

What kind of device can stop an attack while it’s happening, offers VPN and load balancing support, and includes an anti virus solution?

A

UTM (Unified Threat Management)

19
Q

Local Security policy works great for individual systems, but if you want to apply the same settings to more than one PC on your network, you’re better off using ______ for more granular control over your network clients

A

Group Policy

20
Q

Some attacks take advantage of human shortcomings to gain access that should otherwise be denied. What type of attack is this?

A

Social engineering

21
Q

A man in the middle trap is often used to combat what form of infiltration?

A

Tailgaiting

22
Q

A fingerprint scanner would use what type of factor to establish identity?

A

Inherence factor (something you are)

23
Q

What is the order of the best practice for malware removal according to 902 exam standards?

A
  1. Identify malware symptoms
  2. Quarantine infected system
  3. Disable system restore (Windows)
  4. Remediate infected systems
  5. Schedule scans and run updates
  6. Enable system restore and create a new restore point
  7. Educate end user
24
Q

A dictionary attack is a form of _______ attack which essentially guesses every word in a dictionary

A

Brute force

25
Q

A security hole is often found in software after its release and can be unknown by the developer. The security hole may be exploited by an attacker before the developer can fix it. This is known as a ______ attack

A

Zero day

26
Q

What is the most secure W-Fi encryption we have today?

A

WPA2

27
Q

What is like a virus, but does not require a host application to be transported, and is self contained and can reproduce on its own?

A

Worm