Lesson 6 - Chapter 2: Configuring Web Browser Settings Flashcards

1
Q

You should only download and install apps from trusted sources such as…?

A

the manufacturer’s website or well-known app stores (Apple App, Microsoft Store, Ninite, Softpedia)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s one of the most commonly used methods of verifying a download can be trusted?

A

Run a checksum or hashing total on the file

(a hash total is available from the trusted source most often)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you use a hashing total?

A

You compare the string available from the trusted source (MD5 or SHA256) to a hashing total generated on the downloaded file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On a Windows system, the PowerShell command _____ will generate a hash total for comparison with the hash value provided by the trusted source.

A

Get-FileHash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

According to Microsoft, what is an untrusted source?

A

any source that is not from the Microsoft store or sites Microsoft has listed as trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to Android, what is an unknown source?

A

apps or content not obtained from Google Play

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to Android, what are unknown developers?

A

Files not from the App store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Browser extensions are also called what?

A

Plug-ins, add-ons

(all mean the same thing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a browser extension/add-on?

A

a feature enhancement for the browser or enables an existing feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a plug-in?

A

It can provide support for certain tasks like viewing videos, opening PDF files, working with spreadsheets, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s a word of caution when it comes to extensions and plug-ins?

A

there are malicious ones, and can be very difficult to remove once installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the difference between a browser extension and a browser plug-in?

A

an extension runs outside of the browser to which it’s attached, a browser plug-in runs inside the browser

(Browser extension adds features or enhancements to features and plug-ins add support for certain tasks or features)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s a trusted source where you could install extensions and plug-ins?

A

application store of each OS provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What password managers are available for Win 10/11 and macOS?

A

Win10/Win11: Credential Manager in the Control Panel
macOS: Keychain (web and OS credentials)

(apart from the browser password managers available)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a secure connection?

A

encrypts network traffic before it is transmitted over a communication medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of secure connections do web browsers provide for the requests it sends to web servers over an HTTPS link?

A

they apply SSL or TLS encryption for the requests to web servers

17
Q

SSL/TLS provide what 3 layers of encryption for the web page transmitted back to the user?

A
  1. Encryption
  2. Authentication
  3. Integrity
18
Q

What does encryption mean?

A

it keeps the data private

19
Q

What does authentication mean?

A

ensures the data is from the same site the user requested it from

20
Q

What does integrity mean?

A

ensures the data isn’t altered in transit

21
Q

What’s another way besides SSL/TLS encryption to validate that a site is real/not a fake?

A

with a security certificate

22
Q

Why is a security certificate another way to be secure?

A

the certificate itself can be verified (which validates and authenticates a site’s ownership and its domain name)

23
Q

How do you view the security certificate for a website?

A

click the padlock icon on a browser’s address bar

24
Q

What is a pop-up?

A

Generally a nuisance, an object that displays over the top of a web page (may or may not be associated with the page)

(some legit sites require pop-ups for the site to function)

25
Virtually all browsers have a setting for blocking....?
pop-ups (in the privacy settings)
26
A browser saves what 2 types of data?
1. caching data 2. browsing data
27
What is caching data?
data that produces a website's image (browser stores the data to reproduce the page so it doesn't have to re-download the data again from the source server)
28
What is browsing data?
browser history, a historical record of the sites you've visited and downloaded during a period of time (titles, URLs, time and date of the visit, data provided)
29
What does the Private Browsing Mode do?
It doesn't record the user's online activities or cache downloaded files
30
What don't private browsers mask?
the identity of the user and in some cases like on a smartphone, records a small amount of browsing history
31
What is Sign-in/Browser data synchronization?
user coordinates browser software and settings between devices (like Firefox tabs open on PC and on phone) Any action is duplicated on the other after both devices are synchronized
32
How do ad blockers work?
they remove coding from the downloaded web page file that would display the ad