Security Flashcards
What is a smart card?
A hardware device that has an embedded microchip that contains authentication or security information
What is a digital signature?
An electronic signature that can be used to prove the sender’s identity or a document’s signer
What is a digital certificate?
An electronic file that establishes your identity via a public key infrastructure (PKI) to complete transactions
What is chassis intrusion detection in the BIOS?
A physical intrusion detection system that alerts the user if the computer’s cover has been removed
Which type of attach is conducted by an email request from a financial institution asking you to log in and change your password using the provided link?
Phishing
What type of attack uses drones to obtain email accounts to send spam?
A botnet attack
What is the quickest way to lock a Windows 7 computer?
Win + L
How should you protect a portable computer from being stolen in your absence if the portable computer cannot be physically secured using a locking mechanism?
Lock the portable computer in a drawer
What should you do to ensure that an authorized user does not reveal security information or credentials to any unauthorized person?
Implement social engineering mitigation techniques
Which guidelines should you refer to if you find that someone has breached the security of the server room?
The company’s security policy
What is the FIRST action you should perform if you find that your fellow technician has left the door of the server room open?
Close the door
Which software gather’s the user’s information through the user’s internet connection without the user’s knowledge?
Spyware
Which recommended file system format for Windows XP enables advanced performance, security, and reliability features?
NTFS
What are two ways that you can encrypt a file?
- Right-click the file, select Properties, and click Advanced.
- Use the Cipher command
How can you enable some users to access certain files and restrict others from accessing the same files?
Set different permissions for the users
What are the four primary user groups on a Windows XP computer?
Administrators, Power Users, Users, and Guests
Which two passwords can be configured using the BIOS setup utility?
Supervisor password and user password
Which password can be configured to prevent unauthorized access to the BIOS setup utility?
Supervisor password
Which password prevents unauthorized users from booting up the computer?
User password
What should a technician do when facing an error ‘SSL certificates are no longer valid’?
Clear the SSL slate in Internet Explorer
Which type of software can assist you in protecting your computer against virus-related problems?
Antivirus
Why should you not store passwords in a text file on your desktop?
Someone can open the file and read your passwords
In a Microsoft Active Directory domain, what must a user’s password contain by default?
A password must contain three out of the following four conventions: • Upper-case letters • Lower-case letters • Numeric or special characters • At least 8 characters
What should an administrator tell a user about passwords?
Memorize the password, and do not tell anyone the password
What is the maximum length of the Windows password that is supported by Windows XP?
127 characters
What can you configure on a Microsoft Active Directory domain to ensure that all Windows XP and Vista users have passwords that adhere to the company security policy?
Group Policy object
What is the latest encryption standard that must be used to protect the data being transmitted over a wireless network?
Wi-Fi Protected Access, second generation (WPA2)
What are the three levels of encryption standards for wireless networks?
WEP, WPA, and WPA2
Which tool helps determine the security state of an organization?
Windows Baseline Security Analyzer
What should you do if you overhear a private conversation between two managers of a different department?
Keep the information confidential
Which security protocol is used to secure wireless local area networks (WLANs) defined in the IEEE 802.11 wireless networking standard?
Wired Equivalent Privacy (WEP)
What type of virus generally affects the system by attaching itself to MS-Office applications?
Macro virus
What type of virus can infect system files and boot sectors of a computer system?
Multipart and boot sector viruses
What does a polymorphic virus do?
Produces multiple operational copies of itself
What does a self-garbling virus do?
Formats its own code to prevent antivirus software from detecting it
What does a stealth virus do?
Hides the changes it makes as it replicates
What is a Trojan horse?
Malware that is disguised as a useful utility but embeds malicious code in itself
What is a virus?
Malicious software (malware) that relies upon other application programs to execute and infect a system