CPT101 Module 6.2 Flashcards

1
Q

Although some measures to ward off malware are technical, most are just practical common sense to prevent social engineering attacks bc they are the focus of attackers: over ## percent of data breaches start by a phishing attack, and 22 percent of employees have clicked at least one phishing link in the last year.

A

93

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Although the ______ ______ that comes into your home, school, or place of work is generally constant in its “force” (voltage), there may be occasional increases or decreases that can impact sensitive electrical devices, particularly computers

A

electrical power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Total loss of power

A

Blackout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Drop in voltage lasting minutes or hours

A

Brownout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Very short duration of voltage increase

A

Spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Short duration of voltage increase

A

Surge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unwanted high frequency energy

A

Noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _____ _______ can defend computer equipment from spikes, surges, and noise. A _____ _______ lies between the computer and the electrical outlet, and absorbs any electrical change so that it does not reach the computer equipment.

A

surge protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

While surge protectors can protect from a momentary change they cannot provide power in the event of a ______ or _______

A

blackout, brownout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In this case an _____________ power supply (UPS) can be used. Like a surge protector, a UPS is positioned between the computer and electrical outlet; however, it contains a battery that maintains power to the equipment for a short time in case of an interruption in the primary electrical power source.

A

uninterruptible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

you should always be aware of the risk of ______ with your mobile devices

A

theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To prevent laptops from being stolen you can use a _____ _____. Most portable devices (as well as many expensive computer monitors) have a special security slot built into the case for this

A

cable lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A cable lock can be inserted into the ______ _____ and rotated so that the cable lock is secured to the device. The cable can then be connected to an immovable object.

A

security slot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Features: The device can generate an _____ even if it is on mute.

A

alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Features: _____ _____ ________ If the battery is charged to less than a specific percentage, the device’s last known location can be indicated on an online map.

A

Last known location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Features: ______ The current location of the device can be pinpointed on a map through the device’s GPS

A

Locate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Security Features: ______ _______ The mobile device can be remotely locked and a custom message sent that is displayed on the login screen.

A

remote lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security Features: ______ ______ A thief who enters an incorrect passcode three times will have his or her picture taken through the device’s on-board camera and emailed to the owner.

A

thief picture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If a lost or stolen device cannot be recovered, it might be necessary to perform ______ ______ing, which erases the sensitive data stored on the mobile device

A

remote wiping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data backups can protect against hardware malfunctions, user error, software _______tion, and natural disasters

A

corruption

21
Q

______ ______s can also protect against cyberattacks because they can restore infected computers to their properly functioning state

A

data backups

22
Q

However, there are sometimes situations when an online backup service may not be the right choice, such as when only a ____ _______ connection is available. In that case you can perform your own backup from the hard drive to another medium and then store that medium in a remote location.

A

slow internet

23
Q

Wi-Fi is a wireless data network technology that provides high-speed data connections for mobile devices. This type of network is technically known as a wireless _____ ____ ________ (WLAN).

A

local area network

24
Q

Devices such as tablets, laptop computers, smartphones, and wireless printers that are within range of a centrally located connection device can send and receive information using _____ _______ (RF) transmissions at high speeds.

A

radio frequency

25
This central connection device needed for a home-based Wi-Fi network combines several networking technologies. These are usually called wireless ______s.
routers
26
The ______ _____ acts as the “base station” for the wireless devices, sending and receiving wireless signals between all devices as well as providing the “gateway” to the external Internet (it typically is connected to the user’s modem that is in turn connected to an Internet connection).
wireless router
27
On Public WiFi, attackers can read any wireless transmissions sent to and from the user’s device. In addition, an attacker may set up an ____ ____, another computer designed to mimic an authorized Wi-Fi device. A user’s mobile device may unknowingly connect to this ____ ____ instead of the authorized device so that attackers can receive the user’s transmissions or directly send malware to the user’s computer. (same word)
evil twin
28
Wireless Router Settings: Disable _____ broadcasts- This prevents the wireless router from “advertising” the wireless network to anyone in the area
SSID
29
Collected civilian data is then aggregated by ____ _____s tht hold thousands of pieces of information on hundreds of millions of consumers worldwide. These ______s then sell the data to interested third parties such as marketers or even governments.
data brokers
30
_________ is the process of ensuring that the person requesting access to a computer or other resources is authentic, and not an imposter. There are diff. types.
Authentication
31
_______s are by far the most common type of authentication today. Yet despite their widespread use, they provide only weak protection
passwords
32
The weakness of passwords is due to ______ _______: you can memorize only a limited number of items.
human memory
33
Most common password ######
123456
34
A _____ _______ is a longer combination of letters, numbers, and/or symbols that unlocks access to protected electronic data.
strong password
35
A longer password is always more secure than a shorter password, regardless of complexity. In other words, Long is strong. This is because the longer a password is, the more ______s an attacker must make to break it.
attempts
36
Most security experts recommend that a secure password should be a minimum of ##-20 characters in length.
15
37
Instead of relying on human memory for passwords, security experts universally recommend that you use a _______ _________, a program installed on your computer or mobile device tht allows you to create and store multiple strong passwords in single user “vault” file that is protected by one strong master password
password manager
38
________ ________ uses the unique characteristics of your face, hands, or eyes to authenticate you.
Biometric security
39
Another type of fingerprint scanner is a ________ fingerprint that requires you to move your finger across a small slit or opening
dynamic
40
A biometric authentication that is becoming increasingly popular on smartphones is facial recognition. Every person’s face has several distinguishable “landmarks” called ______ points.
nodal
41
Using a standard computer webcam, facial recognition software can measure the nodal points and create a _______ ____ (faceprint) that represents the face.
numerical code
42
And encryption can be applied to data on your hard drive (data-at-____) just as it can be used to protect data being transmitted across the Internet (data-in-______).
rest, transit
43
A _____ ________ is a technology used to verify a user’s identity and key that has been “signed” by a trusted third party. This third party verifies the owner and that the key belongs to that owner.
digital certificate
44
ID Theft Techniques: ______ ______ing Discarded credit card statements, charge receipts, and bank statements can be retrieved after being discarded in the trash for personal information
dumpster diving
45
ID Theft Techniques: Using a standard ______-of-_______ form the attackers divert all mail to their post office box so that the victim never sees any charges made.
change, address
46
ID Theft Techniques: ______ing An attacker who pretends to be from a legitimate research firm asks for personal information.
pretexting
47
ID Theft Techniques: ______ing -Stolen wallets and purses contain personal information that can be used in identity theft.
Stealing
48
Financial information is frequently stolen by online attackers. Avoiding this theft involves two basic steps: 1. deter thieves by ________ing information and the second step is to monitor _______ statements and accounts
safeguarding, financial
49
A ______ is a file created by a website that stores information on your computer, such as your website preferences or the contents of an electronic shopping cart.
cookie