security Flashcards

1
Q

the process of verifying the identity of a person or device.

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

authentication typically occurs when ?

A

during logon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this is used to prevent someone from opening the case to your computer

A

chassis lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Some motherboards allow you to set a password on the system hard disk, it is called

A

drive locking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

it is used to helps identify when a system case has been opened

A

chassis intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a special chip, on the motherboard, that generates and stores cryptographic keys

A

Trusted Platform Module (TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TPN chips are configured using what program

A

BIOS/UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a mechanism used to secure systems that are prone to being stolen, such as notebooks systems.

A

lo-jack software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how is lo-jack software implemented

A

within a chip located on the motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UEFI systems requires that firmware updates are digitally signed who

A

hardware vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a UEFI security feature which requires the operating system installed on the system hard drive to be digitally signed

A

SecureBoot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

malware that inserts itself into the boot sector causing it to be loaded first

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this is used by UEFI to prevent rootkit

A

SecureBoot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a Microsoft tool used to encrypt an entire computer’s hard drive or removable storage disk, to protect the drive contents from malicious offline attacks

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BitLocker requires what

A

a system partition. 100 MB volume and

operating system partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which BitLocker partition is encrypted

A

operating system partition

17
Q

a tool used in Windows for encrypting individual files

A

encrypting file services (EFS)

18
Q

EFS can only be performed on

A

NTFS partitions

19
Q

a secure communication channel between two hosts

A

VPN

20
Q

common protocols used for establishing a VPN connection

A

IPSec
PPTP
L2TP

21
Q

this protocol can be added to another protocols to provide security and encryption

A

secure sockets layers (SSL)

22
Q

a device, or software, that inspects network traffic and allows or blocks traffic based on a set of rules

A

firewall

23
Q

this type of firewall inspects traffic as it flows between networks.

A

network based firewalls

24
Q

this type of firewall inspects traffic received by a specific host.

A

host based firewall

25
Q

firewalls use ____ to identify allowed and blocked traffic

A

ACL’s