Quiz 12 Flashcards
______ maintains a controlled environment. They have strict control over what apps can be installed, and they reserve the right to refuse any app that doesn’t measure up. This is called a ______ system
Apple, Closed source
_____ can be considered the opposite of Apple. Manufacturers can customize the OS as they see fit and apps are availableto purchase and download through various app stores. This is called an ____ system
Android, Open source
A _____ protects an internal network from unauthorized access to and from the Internet by hiding addresses and blocking ports`
Firewall
Current laptops typically use what kind of RAM?
204 pin DDR3 SO-DIMM
Most laptops today have either ______ or M.2 expansion slots for internal cards such as wireless NICs
Mini-PCIe
What mobile device feature allows a user to rotate a tablet and have the screen rotate with the device?
Accelerometer
A room that requires one door to be closed in order to access a second door (mantrap) is a security measure to prevent against what kind of infiltration?
Tailgaiting
What kind of technology uses an inherence factor to establish identity?
Biometrics
What are the seven steps of the laser printing process?
1) Processing
2) Charging
3) Exposing
4) Developing
5) Transferring
6) Fusing
7) Cleaning
Laptops can be easily stolen. One of the best ways to protect your laptop from this is to use a _____
Cable lock
After installing a printer, it only prints garbled text. What is the most likely cause of this issue?
Incorrect or corrupt print drivers
What type of malware takes control of your computer, encrypts your data, and asks for cash to remediate the issue?
Ransomware
What type of authentication factor is this?
Somewhere you are, which can be pinpointed by GPS
Location factor
What type of authentication factor is this?
Something you posses, such as a smart card
Ownership factor
What type of authentication factor is this?
Time based factor which may require logging on at a certain time of day
Temporal factor
What type of authentication factor is this?
Something the user is or something they do, such as a retinal pattern
Inherence factor
What type of authentication factor is this?
Something the user knows, such as a username and password
Knowledge factor
What is the most effective method to protect sensitive data from access if your device is stolen?
Remote wipe
A type of virus that changes its signature (varied, but operational copies of itself), to prevent detection is called a ______ virus
Polymorph
What is the most secure W-Fi setting as of today?
WPA2
A virtual private network creates what through the internet?
Tunnel
What type of attack takes advantage of human shortcomings to gain access that should otherwise be denied?
Social engineering
Where is the WiFi antenna typically stored in a laptop
Monitor
What is the best procedure for malware removal according to 901 exam standards?
1) Identify malware symptoms
2) Quarantine infected system
3) Disable system restore (Windows)
4) Remediate infected systems
5) Schedule scans and run updates
6) Enable system restore and create a new restore point (Windows)
7) Educate end user
What is a rootkit?
A program that takes advantage of very low level operating system functions to hide itself
What is a worm?
Malware that replicates on its own through hardware or through networks
What is a Trojan Horse?
Malware that appears to be something beneficial but usually has evil intent
What is a Botnet?
A network of infected computers under the control of a person or group
What is a Virus?
Malware that often hides until it can be activated by human action, possibly stealing information
What is Ransomware?
Encrypts data on a drive and then demands money to decrypt the same data
What type of attack involves a hacker changing the MAC address on their computer to that of a server, causing a router to adjust its MAC tables accordingly?
Address spoofing
What types of printers are referred to as page printers because they receive their print job instructions one page at a time?
- Inkjet
- Laser
What malware is similar to a virus, but it can reproduce itself, is self contained, and doesn’t need a host application to be transported?
Worm
What is the typical screen size for a phablet?
5”-7”