Security and Maintenance Flashcards
People who try to gain unauthorized access to computer systems.
Employ many different methods to obtain what they want.
Hackers
Use a minimum of SIX characters, EIGHT or more characters is even better,
with 15 characters considered the most secure.
Password
It is a malicious program designed to take control of system operations, and
damage or destroy data.
Virus
It is a self-replicating program that consumes system and network resources.
Worm
It is a program designed to allow a hacker remote access to a
target computer system.
Trojan (Trojan Horse)
It is a program designed to allow a hacker remote access to a
target computer system.
Spyware
It is a software application that automatically displays or downloads
advertisements.
Adware
It is a small text file placed on your computer by a Web server.
Cookie
It is the practice of tricking users into giving out passwords or other
types of access information.
Social Engineering
It is the process of trying to gather sensitive information such as a password, or
credit card details from an unsuspecting victim by pretending to be a trustworthy
entity.
Phishing
It is used to scan your computer for known
viruses, and to eliminate any viruses that are discovered.
Antivirus Software
It is a security barrier that filters and controls the flow of information coming
into and out of a private network.
Firewall
Firewalls can also be implemented through software known as BLANK
Personal Firewalls
It offers many firewall features, such as inspection of all incoming
transmissions for security threats.
Desktop Firewalls
While you are browsing the Internet, the Address bar in your browser
uses the BLANK. This protocol is used for
normal web site activity, such as browsing and navigating. It is not a
secure protocol.
Hypertext Transfer Protocol (http)
To conduct secure transactions over the Internet, web servers use BLANK
Hypertext Transfer Protocol Secure (https)
It is the process of confirming the identity of a user or computer system.
Authentication
It is the process of converting data into an unreadable form of text, which then
requires a decryption key in order to be read.
Encryption
It is an encrypted connection between two computers.
VPNs allow secure, private communications across long distances using the Internet as
the pathway for communication instead of using a dedicated private line.
VPN (virtual private network)
It is a duplicate copy of a program, a disk, or data, made either for archiving
purposes or for safeguarding files from loss if the active copy is damaged or destroyed
Backup
It is the main backup tool in Windows 10 for backing up your
personal files. Additionally, it automatically stores a version history of your files, allowing
you to restore previous versions of a file if needed
File History feature
If you accidentally delete a file that you need, or if one of your files becomes corrupted,
you can easily restore it to your hard drive from the saved backup media using BLANK
Backup
and Restore
It is a saved snapshot of your computer’s Windows system files, program
files, and Windows registry settings at a specific point in time
Restore point
It is an exact image of a hard drive; it includes Windows and your
system settings, programs, and files.
System Image
It gives you a fresh installation of Windows without deleting your
personal files (pictures, documents, videos, and so on), your personalization settings,
or apps that you installed from the Windows store.
Refreshing a PC
It gives you a fresh installation of Windows and preserves nothing. It is
just like formatting the hard disk and starting over with a fresh installation of the
operating system
Resetting a PC
It is an organized process of trial and error. You may need to try several
different approaches before you can narrow down and find a solution, and generally,
you use a process of elimination.
Troubleshooting