Comptia A+ 220-802 Chapter 17 Flashcards

1
Q

refers to being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device.

A

Tailgating pg 800-CH17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a type of badge or card that gives you access to resources, including buildings, parking lots, and computers. It contains information about your identity and access privileges.

A

smart card pg 801- CH17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Privacy Filters?

A

Privacy filters are either film or glass add-ons that are placed over a monitor or laptop screen to prevent the data on the screen from being readable when viewed from the sides. Only the user sitting directly in front of the screen is able to read the data. pg 802

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

________is an application that is installed on a system to

protect it and to scan for viruses as well as worms and Trojan horses.

A

antivirus software. pg 803

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____can be thought of as an intermediary between your

network and any other network.

A

proxy firewall pg 804

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the definition of least privilege?

A

When assigning permissions, give users only the permissions they need to do their work and no more. pg 808

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________information about your network and system by social means, such as talking to people in the organization.

A

Social engineering pg 809

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
\_\_\_\_\_\_are software programs that have the ability to hide certain things from the operating system; they do so
by obtaining (and retaining) administrative-level access.
A

Rootkits pg 810

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______is a form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request.

A

Phishing pg 810

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

differs from other malware in that it works often actively on behalf of a third party. Rather than self-replicating, like viruses and worms, _______ is spread to machines
by users who inadvertently ask for it.

A

Spyware pg 811

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is designed to make itself difficult to detect or analyze.
Armored viruses cover themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus.

A

armored virus pg 814

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

attaches itself to legitimate programs and then creates

a program with a different file name extension.

A

companion virus pg 815

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A_______exploits the enhancements made to many application programs. Programmers can expand the capability of applications such as Microsoft Word
and Excel.

A

macro virus pg 815

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A_______attacks your system in multiple ways. It may

attempt to infect your boot sector, infect all of your executable files, and destroy your application files.

A

multipartite virus pg 815

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A______alters other programs and databases. The virus infects all of these files. The only way to remove this virus is to reinstall the programs that are infected.
If you miss even a single incident of this virus on the victim system, the process will start
again and infect the system once more.

A

phage virus pg 815

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A__________is an algorithm or other element of a virus that uniquely identifies it.

A

signature pg 816

17
Q

A_______attempts to avoid detection by masking itself from applications.

A

stealth virus pg 816

18
Q

A______is different from a virus in that it can reproduce itself, it’s self-contained, and it doesn’t need a host application to be transported.

A

worm pg 817

19
Q

__________are programs that enter a system or network under the guise of another program.

A

Trojan horses pg 818

20
Q

There a number of best practices involved with securing a workstation. CompTIA has identified seven that should appear on any roster: pg818

A
Set strong passwords
Require passwords.
Restrict user permissions.
Change default usernames.
Disable the guest account.
Make the screensaver require a password.
Disable autorun functionality.
pg 818
21
Q

involves applying a strong magnetic field to initialize the media (this is also referred to as disk wiping).

A

Degaussing pg 823

22
Q

Name 5 ways to secure your SOHO Wireless Network? Their are 14 total that Comp Tia wants you to know.

A
Change the default SSID.
Disable SSID broadcasts.
Disable DHCP or use reservations.
Use MAC filtering.
Use IP filtering. 
pg 824
23
Q

Why should you change the default Usernames and Passwords after the installation of any network device?

A

Failure to do so leaves that device open for anyone recognizing the hardware to access it using the known factory password. pg 827

24
Q

If you don’t know a workstation’s MAC address. Which command prompt can you use to locate the MAC Address?

A

IPCONFIG /ALL to find it in the Windows-based world pg 827

25
Q

One method of “protecting” the network that is often recommended is to turn off the______Broadcast?

A

SSID pg 825

26
Q

What is the definition of SSID and what is the acronym of SSID stand for? pg 825

A

Service Set Identifier (SSID) is the wireless network name broadcast

27
Q

This virus change form to avoid detection. These types of viruses attack your system, display a message on your computer, and delete files on your system.
The virus will attempt to hide from your antivirus software.

A

Polymorphic viruses pg 816

28
Q

A virus, in most cases, tries to accomplish one of two things:

A

render your system inoperable or spread to other systems. pg 813

29
Q

The most effective method of preventing viruses, spyware, and harm to data is

A

User Education pg 808

30
Q

A________attack attempts to use a broadcast
ping (ICMP) on a network. The return address of the ping may be a valid system in your network. This system will be flooded with responses in a large network.

A

smurf attack pg 806