Securing Devices and Data Flashcards

1
Q

Encrypting File System (EFS)

A

A file system which allows encryption of individual drives and folders on any NTFS volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BitLocker-To-Go

A

A BitLocker component used to protect removable drives, such as USB flash drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BitLocker

A

An entire volume encryption feature included with Windows Vista and Windows 7 Ultimate and Enterprise editions, and Windows 8 and higher Professional and Enterprise editions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trusted Platform Module (TPM)

A

A microchip installed on the motherboard of desktop and portable computers, which stores critical encryption keys in hardware inaccessible to the operating system or most attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Degausser

A

A device which uses powerful electromagnets to destroy all data on magnetic media like tapes and hard drives, but not optical or flash storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Event Viewer

A

A tool used to detect and diagnose unusual system behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rescue disk

A

A combination of antimalware and system repair tools on a bootable disc or flash drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption tools: EFS (Encrypting File System)

A

Encrypting File System allows encryption of individual drives and folders on any NTFS volume. It is included with Business/Professional/Enterprise/Ultimate editions of Windows, as well as all editions of Windows Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption tools: BitLocker

A

Encrypts entire NTFS volumes, including the system drive. It is available on Enterprise and Ultimate Editions of Windows Vista and 7, Pro and Enterprise versions of Windows 8 and later, and all editions of Windows Server 2008 and later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption tools: BitLocker-To-Go

A

A BitLocker component used to protect removable drives, such as USB flash drives. It can encrypt drives formatted as FAT16, FAT32, and ExFAT as well as NTFS. It is included in Windows 7 and later systems which include BitLocker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is used to encrypt files on your USB drive?

A

BitLocker-To-Go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trusted Platform Module (TPM) is a microchip installed on the motherboard of desktop and portable computers, which stores critical encryption keys in hardware inaccessible to the operating system or most attackers. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What allows encryption of individual drives and folders on any NTFS volume?

A

EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BitLocker: It is an entire volume encryption feature included with Windows Vista and Windows 7 Ultimate and Enterprise editions. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BitLocker: It uses a MDM which is a microchip installed on the motherboard of desktop and portable computers. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BitLocker: It can encrypt the NTFS volumes including the system volume. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BitLocker: It requires a smaller boot volume with at least 20 MB of free space in order to perform the decryption routines. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BitLocker: BitLocker Drive Encryption is compatible with EFS. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Screen lock options: Swipe screen

A

Swipe a finger across the screen, or a certain part of the screen, to unlock. This doesn’t offer any security against intrusion at all: at best, it prevents accidental input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Screen lock options: Password

A

A strong password provides very strong authentication, but it’s more trouble to enter on a touchscreen keyboard than a physical one, especially if it includes mixed cases and special characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Screen lock options: Passcode/PIN

A

Unlock the device with a numeric passcode. Not as strong as a password, but easier to enter, and even a four-digit PIN allows for 10,000 combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Screen lock options: Pattern

A

Unlock the device by drawing a predefined pattern over points on the screen. This can be easier than a passcode, but choosing a pattern that’s both easy to enter and hard to guess might be challenging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Screen lock options: Fingerprint

A

A biometric device with a fingerprint scanner isn’t entirely foolproof—it’s not just spy movie stuff for a clever hacker make a “fake finger” from some glue and an existing fingerprint smudge on the screen. That said, it’s strong protection against most intruders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Screen lock options: Face

A

Uses the device camera and face recognition software. Can potentially be fooled by using a photo, but newer versions add additional measures like requiring the user to blink. Cameras with infrared (IR) sensitivity are especially effective for facial recognition under varying light conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Mobile device policies: Permitted devices

A

Required features, operating systems, or models for a device to be allowed under the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Mobile device policies: Support

A

Who supports what aspects of device functions. IT may not have the time or training to support everything that can go wrong on a wide range of user devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Mobile device policies: App and data ownership

A

Policies should clearly specify what apps and data are company property, for example work email messages and corporate documents. Mobile containerization technologies can even allow part of an employee-owned device’s memory and storage to be securely set aside for corporate purposes, or vice-versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Mobile device policies: Privacy

A

Employees should expect some privacy with personal activities and data on their own devices, but at the same time it might be limited during work hours or on company networks. The policy should spell out employee privacy expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Mobile device policies: Network access

A

Some workplaces may choose to limit personal devices to limited access or guest networks. This can limit their usefulness, but makes it easier to secure them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Mobile device policies: Onboarding and offboarding

A

There should be a set process for how an employee needs to prepare a device to join the program, and another for what happens when an employee leaves or just stops using a particular device for work. Offboarding should also address what happens with devices subsidized by the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Mobile device management (MDM) is a type of security software used by an IT department to monitor, manage, and secure employees’ mobile devices. True or False?

A

True

32
Q

What kind of policy governs a user-owned device on the corporate network?

A

BYOD (Bring-your-own-device)

33
Q

Common malware symptoms: File alteration

A

Any unexpected alteration to files can be indicative of malware. They might be renamed or deleted suddenly, or vanish gradually over time.

34
Q

Common malware symptoms: Unfamiliar programs

A

Programs that shouldn’t be installed can indicate malware, either because they were installed by existing malware or because a user carelessly installed a compromised application.

35
Q

Common malware symptoms: Security alerts

A

If your antivirus scanner occasionally detects and quarantines threats you should review the log to see what they were. Frequent alerts could represent network vulnerabilities, or some other, undetected malware that’s opened a backdoor into the system.

36
Q

Common malware symptoms: Browser oddities

A

Malware frequently attacks or affects web browsers. This might manifest as something as simple as excessive or unusual pop-up ads, or new toolbars and add-ons in the browser.

37
Q

Common malware symptoms: Email issues

A

Receiving excessive spam isn’t necessarily a sign of malware, but it can increase the risk of contracting it: consider client protection and spam filtering if it’s a problem.

38
Q

Common malware symptoms: Stability and performance

A

Malware can cause all sorts of problems with overall system performance: application crashes, operating system lockups or reboots, network connectivity problems, or just performance slowdown.

39
Q

Common malware symptoms: Failed updates

A

To prevent detection or removal, malware will frequently disable tools that can fight it. Operating system updates can fail, or refuse to launch.

40
Q

Malware removal tools: Antivirus scanner

A

Real-time, scheduled, and manual anti-virus scans are the first line of defense against malware. If one product can’t find the infection you can always try another.

41
Q

Malware removal tools: Antimalware software

A

Apart from traditional antivirus scanners, some products specialize in detecting a broader range of threats, such as changes made by spyware, adware, or rootkits. Other tools are designed to remove specific threats.

42
Q

Malware removal tools: Event Viewer

A

Used to detect and diagnose unusual system behavior. System logging software won’t remove malware, but it might show you how it was contracted or what changes were made.

43
Q

Malware removal tools: System Restore

A

Saves and restores system files and settings, allowing you to recover from some harmful changes—even those you might accidentally cause in the cleanup process.

44
Q

Malware removal tools: System backups

A

Restoring from data backups can recover data lost to malware, and restoring from a complete system image is even a valid form of malware removal.

45
Q

Malware removal tools: Terminal

A

As useful as GUI tools, some troubleshooting is easier when you’re familiar with command-line tools. Sometimes you might even have to boot to a command prompt to salvage a damaged system.

46
Q

Malware removal tools: MSCONFIG

A

Allows you to change boot options. Malware frequently changes boot settings, or adds malicious programs or services to the startup process. MSCONFIG also is one way to enter safe mode or other controlled startup environments.

47
Q

Malware removal tools: Installation media

A

If system files are missing or damaged, you might be able to restore them from an operating system installation disc or flash drive.

48
Q

Malware removal tools: Recovery environment

A

If the computer won’t boot or if malware has compromised the operating system enough to prevent repair, you’ll need an alternate boot environment.

49
Q

Malware removal tools: Rescue disk

A

A combination of antimalware and system repair tools on a bootable disc or flash drive. There are many free preconfigured products, some from antivirus vendors: they include PC Tools’ Alternate Operating System Scanner, Kaspersky Rescue Disk, and Microsoft’s Windows Defender Offline.

50
Q

Mobile security symptoms: Device and network performance

A

Heavy resource utilization, slow network speeds, and rapid battery drain can suggest either malware or just a misbehaving application.

51
Q

Mobile security symptoms: Exceeded data limits

A

Most mobile plans have monthly limits for data use. Even when they don’t, providers and devices can monitor data usage.

52
Q

Mobile security symptoms: Unexpected feature activation

A

Some mobile features, while very useful, can consume battery life and compromise security or privacy. It’s easy and good practice to turn some of these off when you don’t need them, such as Wi-Fi, Bluetooth, or location tracking.

53
Q

Mobile security symptoms: Surveillance risks

A

Mobile devices make perfect surveillance devices in the hands of a malicious or unwary users. Even if features like cameras, microphones, and location tracking aren’t turned on by malware, it’s easy to leak sensitive data using these features in normal applications.

54
Q

Mobile security symptoms: Changed app permissions

A

For security reasons mobile apps should only be given permissions they need to function. For example you shouldn’t give an app access to the camera or ability to place calls unless you trust it and it actually needs that capability.

55
Q

Mobile security symptoms: Unintended Wi-Fi access

A

Joining an untrusted Wi-Fi network is a security risk. Unencrypted Wi-Fi networks can leave your network communications open to eavesdropping, and even a “secure” hotspot run by a malicious party might be used to steal data or perform network attacks.

56
Q

Mobile security symptoms: Unintended Bluetooth pairings

A

Whether caused by malware or not, pairing with an unfamiliar or unintended Bluetooth device can endanger security. Review paired Bluetooth devices and investigate any unexpected entries.

57
Q

Mobile security symptoms: Unauthorized root access

A

Not only can malware force root access, but a device jailbroken or rooted by a legitimate user can be more vulnerable to malware.

58
Q

Mobile security symptoms: Suspicious apps

A

Apps the user doesn’t know about, or that come from third-party appstores or websites, might be a security risk. With so many available apps it can be hard to tell what’s unusual, but investigate anything that sticks out.

59
Q

Mobile security symptoms: Unauthorized account access

A

On network-centric mobile devices, there can be many signs of unauthorized access from outside sources.

60
Q

Mobile security symptoms: Leaked data

A

Mobile devices are easy ways to leak personal or business data. Not only can it be stolen from the device itself or a cloud backup, the device can be used to smuggle data from inside a secure enterprise network.

61
Q

Mobile security Tools: Antimalware

A

Just like on the desktop, you can use anti-malware software to monitor the system or actively scan for signs of malware. Apple claims that iOS devices are not vulnerable to malware and does not allow malware scanners in its App Store, but a variety are available for Android and Windows Phone.

62
Q

Mobile security Tools: App scanner

A

Other scanners don’t look specifically for malware such as for app problems or changes. They can help notice unusual activities even if they’re not strictly malware.

63
Q

Mobile security Tools: Wireless analyzer

A

To verify signal problems, you can just try moving the device. You can also use a Wi-Fi analyzer or cell tower analyzer, either as a specialized appliance or an app on another mobile device.

64
Q

Mobile security Tools: App control features

A

If you think an app is having a problem, you can force stop it from within the operating system, or uninstall and reinstall it. You can even uninstall apps remotely from iTunes or the Google Play Store.

65
Q

Mobile security Tools: Backup and restore

A

Not only can you backup and restore mobile data and settings to and from your desktop, you can also store it using cloud services like Google Sync, iCloud, or OneDrive.

66
Q

Mobile security Tools: Factory resets

A

Mobile devices are easy to reset to a freshly installed state, deleting user data, installed apps, and, hopefully, any installed malware.

67
Q

What is the order for the malware removal process in windows?

A
  1. Identify Symptoms
  2. Quarantine the system
  3. Disable system restore
  4. Repair the system
  5. Update the system
  6. Enable system restore
  7. Educate the end user
68
Q

The Event Viewer is used to detect and diagnose unusual system behavior. True or False?

A

True

69
Q

What is used to monitor a system or actively scan for signs of malware?

A

Antimalware software

70
Q

What is the function of the Event Viewer tool?

A

It is used to detect and diagnose unusual system behavior.

71
Q

Which of the following allows encryption of individual drives and folders on any NTFS volume?

A

EFS

72
Q

Which is a software that allows IT administrators to control, secure, and enforce policies on smartphones, tablets, and other endpoints?

A

MDM

73
Q

Which screen lock option does not offer any security against intrusion at all?

A

Swipe screen

74
Q

Which tool is used when system files are missing or damaged?

A

Installation media

75
Q

Which tool is used to notice unusual activities in a device even if they’re not strictly malware?

A

App scanner

76
Q

Which mode of BitLocker authentication allows the user to start up the computer and log into Windows as normal?

A

Transparent operation