Chapter 28 Review: Securing Computers Flashcards
What type of attack is represented by a hacker changing their MAC address to match the server, causing the router to adjust MAC address tables accordingly?
Address spoofing
What type of network matches the following firewall settings?
Enables you to share resources, discover other devices, and allow other devices to discover your computer
Private network
What type of network matches the following firewall settings?
Prevents your computer from sharing and disables all discovery protocols
Guest or Public Network
What type of network matches the following firewall settings?
The controller on the network tells your machine what it can and cannot share
Domain Network
Laptops are easily stolen. One of the easiest ways to physically protect your laptop is with a _______
Cable lock
A type of virus that changes its signature to varied, but operational copies of itself to prevent detection is a _____ virus
Polymorph
A user logs in with a user name and password, and then a numeric key on a fob he possesses. What type of authentication is this?
Two factor authentication
A _____ is carried around by a user and contains a series of numbers that changes from time to time that can be used to access a secure location
Security Token
_____ is when your computer is locked or your data is encrypted until you pay a certain amount of money to a hacker
Ransomware
The _______ states that user accounts should have permission to access only the resources they need and no more
Principle of least privilige
What type of malware is this?
Often hides until it can be activated by human action, possibly stealing information
Virus
What type of malware is this?
Program that takes advantage of very low level operating system functions to hide itself
Rootkit
What type of malware is this?
Replicates on its own through hardware or through networks
Worm
What type of malware is this?
A network of infected computers under the control of a person or a group
Botnet
What type of malware is this?
Encrypts data on a hard drive and then demands money to decrypt the data
Ransomware