Securing Devices and Data Flashcards

1
Q

Allows encryption of individual drives and folders on any NTFS volume. It is included with Business/Professional/Enterprise/Ultimate editions of Windows, as well as all editions of Windows Server

A

EFS: Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encrypts entire NTFS volumes, including the system drive. It is available on Enterprise and Ultimate Editions of Windows Vista and 7, Pro and Enterprise versions of Windows 8 and later, and all editions of Windows Server 2008 and later.

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Used to protect removable drives, such as USB flash drives. It can encrypt drives formatted as FAT16, FAT32, and exFAT as well as NTFS. It is included in Windows 7 and later systems which include BitLocker

A

BitLocker-To-Go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three ways BitLocker can authenticate:

A

Transparent operation mode
User authentication mode
USB key mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Allows the user to start up the computer and log into Windows as normal

A

Transparent operation mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Prompts the user for a PIN or password on startup

A

User authentication mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stores a startup key on a USB device

A

USB key mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use powerful electromagnets to destroy all data on magnetic media like tapes and hard drives, but not optical or flash storage

A

Degaussers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To securely delete files on an active computer, install a secure deletion program such as:

A

SDlelete, CCleaner, Eraser, and File Shredder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Writes zeroes to the entire drive and restores it to its newly installed configuration

A

low-level format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data destruction utilities

A

DBAN, HDShredder, and KillDisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An entire volume encryption feature included with Windows Vista and Windows 7 Ultimate and Enterprise editions; uses a Trusted Platform Module (TPM) microchip; can encrypt the NTFS volumes including the system volume; requires a smaller boot volume with at least 100 MB of free space in order to perform the decryption routines; and is compatible with EFS

A

Bitlocker Drive Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of security software used by an IT department to monitor, manage, and secure employees’ mobile devices.

A

Mobile device management (MDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Policy governs a user-owned device on the corporate network

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Swing a finger across the screen, or a certain part of the screen, to unlock.

A

Swipe Screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unlock the device with a numeric PIN.

A

Passcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unlock the device by drawing a predefined structure over points on the screen.

A

Pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A strong authentication term of identification which includes mixed cases and special characters.

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A camera with infrared (IR) sensitivity is effective for unlocking the device under varying light conditions.

A

Face

20
Q

Used to force stop an app from within the operating system, or uninstall and reinstall it

A

App control features

21
Q

Used to verify signal problems and check the signal strength or connection speed problems

A

Wireless analyzer

22
Q

Used to monitor the system or actively scan for signs of malware

A

Antimalware

23
Q

Used to rearrange the device to a freshly installed state, deleting user data, installed apps, and, any installed malware

A

Factory resets

24
Q

Used to notice unusual activities in the device even if they’re not strictly malware

A

App scanner

25
Q

Layers of defense in depth strategies

A
Physical Facility
Internal Network
Host
Application
Data
26
Q

Signs of Maleware

A

File alteration, Unfamiliar programs, Security alerts, Log errors, Browser oddities, Email issues, Stability and performance, Failed updates

27
Q

Malware removal tools

A
Antivirus scanner
Antimalware software
Event Viewer
System Restore
System backups
Terminal
MSCONFIG
Installation media
Recovery environment
Rescue disk
28
Q

Mobile troubleshooting tools

A
Antimalware
App scanner
Wireless analyzer
App control features
Backup and restore
Factory resets
29
Q

Steps in removing Malware

A
  1. Identify
  2. Quarantine the system
  3. Disable system restore
  4. Repair the system (anti-malware software)
  5. Update system/schedule future scans
  6. Enable system restore/create new restore point
  7. Educate and document findings
30
Q

Steps to Quarantine a system

A
  1. Isolate removable storage (should be scanned)
  2. Disable all networking and sharing properties
  3. Identify other computers for infection
  4. Limit network connectivity
31
Q

Disable System Restore

A

Win 10: System > System Protection > System Properties > (select drive) > Configure > Disable System Protection > (click ok)

32
Q

Used to detect and diagnose unusual system behavior.

A

Event Viewer

33
Q

Used to save and reinstate system files and settings

A

System Restore

34
Q

Used when system files are missing or damaged

A

Installation media

35
Q

Used when the computer won’t boot

A

Recovery environment

36
Q

Used to change boot options

A

MSCONFIG

37
Q

In iOS, which feature is responsible for locating and remotely wiping lost devices?

A

the Find My iPhone feature in iCloud

38
Q

What are the three recycling or repurposing methods listed on the A+ exam guide?

A

Low-level format vs. standard format
Overwrite
Drive wipe

39
Q

Which three protocols provide encrypted communications between 802.11x wireless clients and wireless access points?

A

Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2

40
Q

Why does WPA use Temporal Key Integrity Protocol (TKIP)?

A

to ensure that a new encryption key is provided for every packet that is sent

41
Q

What does three-factor authentication use?

A

something you know (i.e. username or password), something you have (i.e., smart card), and something you are (i.e., biometric authentication)

42
Q

Which wireless security protocol is most secure: WPA, WPA2, or WEP?

A

WPA2

43
Q

A form of malicious software and Internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer).

A

Rogue antivirus

44
Q

A decoy computer system which helps to trap hackers or track unconventional or new hacking methods.

A

Honeypot

45
Q

A code that is intended to take full or partial control of a system at the lowest levels.

A

Rootkit

46
Q

Provides strong authentication for client/server applications by using secret-key cryptography.

A

Kerberos

47
Q

Steps to remove malware

A
  1. Identify symptoms
  2. Quarantine the infected systems
  3. Disable system restore
  4. Remediate infected system
  5. Update/install anti-malware software
  6. Scan and use removal techniques
  7. Schedule scans and run update
  8. Enable system restore and create a restore point
  9. Educate the end-user