Comptia A+ 220-802 Chapter 17 Flashcards
refers to being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device.
Tailgating pg 800-CH17
is a type of badge or card that gives you access to resources, including buildings, parking lots, and computers. It contains information about your identity and access privileges.
smart card pg 801- CH17
What are Privacy Filters?
Privacy filters are either film or glass add-ons that are placed over a monitor or laptop screen to prevent the data on the screen from being readable when viewed from the sides. Only the user sitting directly in front of the screen is able to read the data. pg 802
________is an application that is installed on a system to
protect it and to scan for viruses as well as worms and Trojan horses.
antivirus software. pg 803
_____can be thought of as an intermediary between your
network and any other network.
proxy firewall pg 804
What is the definition of least privilege?
When assigning permissions, give users only the permissions they need to do their work and no more. pg 808
_________information about your network and system by social means, such as talking to people in the organization.
Social engineering pg 809
\_\_\_\_\_\_are software programs that have the ability to hide certain things from the operating system; they do so by obtaining (and retaining) administrative-level access.
Rootkits pg 810
______is a form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request.
Phishing pg 810
differs from other malware in that it works often actively on behalf of a third party. Rather than self-replicating, like viruses and worms, _______ is spread to machines
by users who inadvertently ask for it.
Spyware pg 811
is designed to make itself difficult to detect or analyze.
Armored viruses cover themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus.
armored virus pg 814
attaches itself to legitimate programs and then creates
a program with a different file name extension.
companion virus pg 815
A_______exploits the enhancements made to many application programs. Programmers can expand the capability of applications such as Microsoft Word
and Excel.
macro virus pg 815
A_______attacks your system in multiple ways. It may
attempt to infect your boot sector, infect all of your executable files, and destroy your application files.
multipartite virus pg 815
A______alters other programs and databases. The virus infects all of these files. The only way to remove this virus is to reinstall the programs that are infected.
If you miss even a single incident of this virus on the victim system, the process will start
again and infect the system once more.
phage virus pg 815