JA Net+ Ch14 Flashcards
What are security policies?
Page 504
These precisely define how security is to be implemented within an organization.
Security Audit
Page 504
A security audit is a thorough examination of your network that includes testing all it’s components to make sure everything is secure.
Which security policy disables all unused network ports so that any nonemployees who happen to be in the building can’t connect a laptop to an unused port.
Page 505
Equipment Access
How often should you review network security according to the book?
Page 506
At least once a year.
Mail relay
Page 507
Mail servers relay to other servers by design. When the email server relays from any server that requests it, it’s called an open relay.
T/F? Desktop modems in a business are relatively safe.
Page 507
False .
Exit interview
Page 508
When an employee leaves a company, all company property needs to be turned in. All accounts should also be immediately disabled.
What is firmware?
Page 512
Firmware is a form of program code and related data that are stored in persistent memory of some sort, such as non-volatile RAM.
Definition files (antimalware)
Page 517
A list of known viruses, virus definition files.
Fixing an Infected computer.
Page 518
Scan all potentially affected disks, and all possible infected external disks. Establish a cleaning station, and quarantine the infected area. Update the virus definitions. If the drives are not working, boot to an antivirus emergency boot disk.