PBQs & Lab Qs Flashcards
A special type of malware that hijacks system resources to mine cryptocurrencies. It is often linked to and performs over mass botnets.
Cryptominer
A type of malware that seeks to track user activity. Often paired with keylogger. Performs redirection to spoofed sites.
Spyware
Malware that digs deep into firmware to try to be undetectable from the OS and the user. Attempts to escalate to the highest privileges. Infects firmware code.
rootkit
Malware packaged as a useful application. Used by attackers to conceal actions.
Trojan
Replication requires user interaction.
Viruses
Backup data type
All selected data regardless of when it was previously backed up.
Full
Backup data type
All data modified since the last full backup Moderate/moderate
Differential
Backup data type
New files and files modified since last backup
Incremental
True or False? The xcopy command will copy specified files and directories.
True
What is the purpose of DHCP?
a) To create a secure internet gateway.
b) To route traffic outside of the network.
c) To provide IP addresses to devices.
d) To resolve hostnames to IP addresses.
c) To provide IP addresses to devices.
Which of the following tasks is MOST likely to be an optional rather than required consideration during physical installation of the wireless router?
a) Proximity to wired PC workstation
b) Proximity to building power socket
c) Proximity to ISP network port
d) Safe location to minimize risks from knocks and spills
a) Proximity to wired PC workstation
Which of the following wireless authentication methods would provide better security on a typical home network?
a) WPA2-SAE
b) WEP-SAE
c) WPA3-EAP
d) WEP-EAP
e) WPA3-SAE
f) WPA2-EAP
e. WPA3-SAE
When configuring a home web server, the destination port was set to 80. What specific type of configuration would have been achieved by setting the destination port to 8080?
a) Port mapping
b) Port triggering
c) UPnP
d) DMZ host
a. Port mapping
Which password setting prevents a password from being re-used?
a) Lockout
b) Complexity
c) Age
d) History
d) History
Why is it important to test that security changes work as expected?
a) Windows has poor security
b) It’s easy to make a mistake
c) Policy settings are glitchy
d) Changes to security take effect after testing
b) It’s easy to make a mistake