Cisco 3 Flashcards

1
Q

Whether it is a software firewall or a hardware firewall on a router, the firewall should be turned on and updated to prevent hackers from accessing your personal or company data.

A

Keep the Firewall On

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious software, such as viruses, Trojan horses, worms, ransomware and spyware, are installed on your computing devices without your permission, in order to gain access to your computer and your data.

A

Use Antivirus and Antispyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hackers are always trying to take advantage of vulnerabilities in your operating systems and your web browsers.

A

Manage Your Operating System and Browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Your computing devices, whether they are PCs, laptops, tablets, or smartphones, should be password protected to prevent unauthorized access.

A

Protect All Your Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Below is a short list of steps you can take to protect your computing devices from intrusion:

Protect Your Computing Devices

A
  1. Keep the Firewall On
  2. Use Antivirus and Antispyware
  3. Manage Your Operating System and Browser
  4. Protect All Your Devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

October 2017, a security flaw in the WPA2 protocol was discovered. This flaw allows an intruder to break the encryption between the wireless router and the wireless client, and allow the intruder to access and manipulate the network traffic.

A

Key Reinstallation Attacks (KRACK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tips for choosing a good password

A
  • Do not use dictionary words or names in any languages
  • Do not use common misspellings of dictionary words
  • Do not use computer names or account names
  • If possible use special characters, such as ! @ # $ % ^ & * ( )
  • Use a password with ten or more characters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the process of converting the information into a form where an unauthorized party cannot read it. Only a trusted, authorized person with the secret key or password can decrypt the data and access it in its original form

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Windows feature that can encrypt data.

A

Encrypting File System (EFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

credit card, ATM card, phone, or fob

Two Factor Authentication

A

Physical object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

open standard protocol that allows an end user’s credentials to access third party applications without exposing the user’s password

A

Open Authorization (OAuth)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

fingerprint, palm print, as well as facial or voice recognition

Two Factor Authentication

A

Biometric scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

to add an extra layer of security for account

A

Two Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

convenient way to communicate with each other quickly

A

Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Microsoft Internet Explorer

A

InPrivate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Google Chrome

A

Incognito

16
Q

Mozilla Firefox

A

Private tab / private window

17
Q

Safari

A

Private: Private browsing

18
Q
A