CPT101 Module 6.2 Flashcards
Although some measures to ward off malware are technical, most are just practical common sense to prevent social engineering attacks bc they are the focus of attackers: over ## percent of data breaches start by a phishing attack, and 22 percent of employees have clicked at least one phishing link in the last year.
93
Although the ______ ______ that comes into your home, school, or place of work is generally constant in its “force” (voltage), there may be occasional increases or decreases that can impact sensitive electrical devices, particularly computers
electrical power
Total loss of power
Blackout
Drop in voltage lasting minutes or hours
Brownout
Very short duration of voltage increase
Spike
Short duration of voltage increase
Surge
Unwanted high frequency energy
Noise
A _____ _______ can defend computer equipment from spikes, surges, and noise. A _____ _______ lies between the computer and the electrical outlet, and absorbs any electrical change so that it does not reach the computer equipment.
surge protector
While surge protectors can protect from a momentary change they cannot provide power in the event of a ______ or _______
blackout, brownout
In this case an _____________ power supply (UPS) can be used. Like a surge protector, a UPS is positioned between the computer and electrical outlet; however, it contains a battery that maintains power to the equipment for a short time in case of an interruption in the primary electrical power source.
uninterruptible
you should always be aware of the risk of ______ with your mobile devices
theft
To prevent laptops from being stolen you can use a _____ _____. Most portable devices (as well as many expensive computer monitors) have a special security slot built into the case for this
cable lock
A cable lock can be inserted into the ______ _____ and rotated so that the cable lock is secured to the device. The cable can then be connected to an immovable object.
security slot
Security Features: The device can generate an _____ even if it is on mute.
alarm
Security Features: _____ _____ ________ If the battery is charged to less than a specific percentage, the device’s last known location can be indicated on an online map.
Last known location
Security Features: ______ The current location of the device can be pinpointed on a map through the device’s GPS
Locate
Security Features: ______ _______ The mobile device can be remotely locked and a custom message sent that is displayed on the login screen.
remote lockout
Security Features: ______ ______ A thief who enters an incorrect passcode three times will have his or her picture taken through the device’s on-board camera and emailed to the owner.
thief picture
If a lost or stolen device cannot be recovered, it might be necessary to perform ______ ______ing, which erases the sensitive data stored on the mobile device
remote wiping
Data backups can protect against hardware malfunctions, user error, software _______tion, and natural disasters
corruption
______ ______s can also protect against cyberattacks because they can restore infected computers to their properly functioning state
data backups
However, there are sometimes situations when an online backup service may not be the right choice, such as when only a ____ _______ connection is available. In that case you can perform your own backup from the hard drive to another medium and then store that medium in a remote location.
slow internet
Wi-Fi is a wireless data network technology that provides high-speed data connections for mobile devices. This type of network is technically known as a wireless _____ ____ ________ (WLAN).
local area network
Devices such as tablets, laptop computers, smartphones, and wireless printers that are within range of a centrally located connection device can send and receive information using _____ _______ (RF) transmissions at high speeds.
radio frequency