Exam 18: Security Strategies

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is true about passwords.

(Multiple Choice)
4.8/5
(37)

Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.

(True/False)
5.0/5
(35)

Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

(Multiple Choice)
4.9/5
(34)

An RFID badge is related to which type of authentication method?

(Multiple Choice)
5.0/5
(34)

With respect to the default users and password settings, how can you use Group Policy to make your system more secure?

(Essay)
4.9/5
(37)

Which of the following is NOT true about using Group Policy on business and professional editions of Windows?

(Multiple Choice)
4.8/5
(34)

List three varieties of smart cards.

(Essay)
4.8/5
(35)

What are two methods users can use to lock down their computer?

(Essay)
5.0/5
(38)
Matching :
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
virus signature
a code used to identify and authenticate a person or organization sending data over a network
worm
a program that AV software recognizes to be potentially harmful or potentially unwanted
social engineering
Correct Answer:
Verified
Premises:
Responses:
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
virus signature
a code used to identify and authenticate a person or organization sending data over a network
worm
a program that AV software recognizes to be potentially harmful or potentially unwanted
social engineering
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
Trojan
type of smart card that contains authentication information
keylogger
software installed on a computer that produces pop-up ads using your browser
RSA tokens
A type of malware that tricks you into opening it by substituting itself for a legitimate program
adware
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
grayware
when someone who is unauthorized follows the employee through a secured entrance to a room or building
digital certificate
type of spyware that tracks your keystrokes, including passwords
tailgating
(Matching)
4.8/5
(36)

Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.

(Essay)
4.9/5
(41)

If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?

(Multiple Choice)
4.7/5
(44)

The best protection against attacks is ________________ protection, for example when multiple firewalls protect the network's computers.

(Short Answer)
4.9/5
(38)

Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

(Multiple Choice)
4.9/5
(31)

On a peer-to-peer network, authentication is the responsibility of the domain.

(True/False)
5.0/5
(36)

If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?

(Multiple Choice)
4.7/5
(43)

Under what circumstances can a blank password be more secure than a non-blank password?

(Essay)
4.7/5
(34)

Describe file and folder encryption in Windows (not how you encrypt a file).

(Essay)
4.7/5
(36)
Showing 21 - 37 of 37
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)