IT APPLICATIONS 8: MANAGING SECURITY SETTINGS Flashcards
Which browser is based on the same code as Chrome?
Microsoft Edge
What will the administrator need to do to ensure the web page shows up as secure?
Add trusted certficates
A Firefox user wants to open up their browser settings to configure their intranet as the home page. How can the Firefox user access the settings?
about:preferences
They also notice the machines lack many patches. If malware infects the servers, what is the likely cause of the high CPU utilization?
Cryptomining software
After verifying there are symptoms of malware, what is the next step the operator should take?
Quarantine
After conducting several analyses, the analyst learns the malware used Windows PowerShell to create new malicious processes in the computer’s memory. What is the analyst’s computer likely infected with?
Fileless malware
The threat actor must establish a connection from the compromised host to a command and control host or network
C2
A developer wants to create functionality for a web browser by making API calls on the back end. What should the developer build?
Extension
A security manager in charge of the vulnerability program for the enterprise is looking at mobile security. They are reading about a “walled garden” approach. What does this entail?
Trusted Source