Exam 18: Security Strategies

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

 After initially installing Windows 7, you need to disable the Guest account so nobody can use it.

Free
(True/False)
4.9/5
(34)
Correct Answer:
Verified

False

 Describe file and folder encryption in Windows (not how you encrypt a file).

Free
(Essay)
4.8/5
(40)
Correct Answer:
Verified

In Windows, files and folders can be encrypted using the Windows Encrypted File System (EFS). This encryption works only with the NTFS file system and business and professional editions of Windows. If a folder is marked for encryption, every file created in the folder or copied to the folder will be encrypted. An encrypted file remains encrypted if you move it from an encrypted folder to an unencrypted folder on the same or another NTFS volume.

 What is a Trojan, and how is it installed?

Free
(Essay)
4.9/5
(36)
Correct Answer:
Verified

A Trojan does not need a host program to work; rather, it substitutes itself for a legitimate program. In most cases, a user launches it thinking she is launching a legitimate program. A Trojan is often embedded in the files of legitimate software that is downloaded from an untrustworthy website, or a user is tricked into opening an email attachment.

Matching Match each item with a statement below. - a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge

(Multiple Choice)
4.9/5
(32)

 If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?

(Multiple Choice)
4.7/5
(34)

Matching Match each item with a statement below. - software installed on a computer that produces pop-up ads using your browser

(Multiple Choice)
4.8/5
(37)

 What inputs would be considered to be part of a biometric device? (Choose all that apply.)

(Multiple Choice)
4.9/5
(34)

 When using the Windows Encrypted File System, what statement is accurate?

(Multiple Choice)
5.0/5
(37)

 A root certificate is the original certificate issued by the CA.

(True/False)
4.9/5
(32)

 Describe Windows Firewall.

(Essay)
4.8/5
(44)

 With respect to the default users and password settings, how can you use Group Policy to make your system more secure?

(Essay)
4.7/5
(29)

 What are some of the ways you can use BitLocker Encryption? (Choose all that apply.)

(Multiple Choice)
4.8/5
(28)

 Using Group Policy, you can set security policies to help secure a workstation.

(True/False)
4.8/5
(36)

 What statement regarding passwords on Windows is accurate?

(Multiple Choice)
4.9/5
(39)

 Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term?

(Multiple Choice)
4.8/5
(43)

 What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

(Multiple Choice)
4.8/5
(32)

Matching Match each item with a statement below. - an attack that can be used to crack a long password by trying words and word combinations

(Multiple Choice)
4.7/5
(35)

 What software program is an example of password management software? (Choose all that apply.)

(Multiple Choice)
4.8/5
(41)

 If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?

(Multiple Choice)
4.9/5
(39)

 What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.)

(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)