Security and Maintenance Flashcards

1
Q

People who try to gain unauthorized access to computer systems.
Employ many different methods to obtain what they want.

A

Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Use a minimum of SIX characters, EIGHT or more characters is even better,
with 15 characters considered the most secure.

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is a malicious program designed to take control of system operations, and
damage or destroy data.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is a self-replicating program that consumes system and network resources.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is a program designed to allow a hacker remote access to a
target computer system.

A

Trojan (Trojan Horse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is a program designed to allow a hacker remote access to a
target computer system.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is a software application that automatically displays or downloads
advertisements.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is a small text file placed on your computer by a Web server.

A

Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is the practice of tricking users into giving out passwords or other
types of access information.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is the process of trying to gather sensitive information such as a password, or
credit card details from an unsuspecting victim by pretending to be a trustworthy
entity.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is used to scan your computer for known
viruses, and to eliminate any viruses that are discovered.

A

Antivirus Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is a security barrier that filters and controls the flow of information coming
into and out of a private network.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewalls can also be implemented through software known as BLANK

A

Personal Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It offers many firewall features, such as inspection of all incoming
transmissions for security threats.

A

Desktop Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

While you are browsing the Internet, the Address bar in your browser
uses the BLANK. This protocol is used for
normal web site activity, such as browsing and navigating. It is not a
secure protocol.

A

Hypertext Transfer Protocol (http)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To conduct secure transactions over the Internet, web servers use BLANK

A

Hypertext Transfer Protocol Secure (https)

17
Q

It is the process of confirming the identity of a user or computer system.

A

Authentication

18
Q

It is the process of converting data into an unreadable form of text, which then
requires a decryption key in order to be read.

A

Encryption

19
Q

It is an encrypted connection between two computers.
VPNs allow secure, private communications across long distances using the Internet as
the pathway for communication instead of using a dedicated private line.

A

VPN (virtual private network)

20
Q

It is a duplicate copy of a program, a disk, or data, made either for archiving
purposes or for safeguarding files from loss if the active copy is damaged or destroyed

A

Backup

21
Q

It is the main backup tool in Windows 10 for backing up your
personal files. Additionally, it automatically stores a version history of your files, allowing
you to restore previous versions of a file if needed

A

File History feature

22
Q

If you accidentally delete a file that you need, or if one of your files becomes corrupted,
you can easily restore it to your hard drive from the saved backup media using BLANK

A

Backup
and Restore

23
Q

It is a saved snapshot of your computer’s Windows system files, program
files, and Windows registry settings at a specific point in time

A

Restore point

24
Q

It is an exact image of a hard drive; it includes Windows and your
system settings, programs, and files.

A

System Image

25
Q

It gives you a fresh installation of Windows without deleting your
personal files (pictures, documents, videos, and so on), your personalization settings,
or apps that you installed from the Windows store.

A

Refreshing a PC

26
Q

It gives you a fresh installation of Windows and preserves nothing. It is
just like formatting the hard disk and starting over with a fresh installation of the
operating system

A

Resetting a PC

27
Q

It is an organized process of trial and error. You may need to try several
different approaches before you can narrow down and find a solution, and generally,
you use a process of elimination.

A

Troubleshooting

28
Q
A