Exam 28: Securing Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How can a technician identify an action or content as prohibited?

(Essay)
4.8/5
(39)

A(n) _______________ is a device or software (or combination of both) used to protect an internal network from unauthorized access from the Internet.

(Short Answer)
4.8/5
(28)

Antimalware programs can passively monitor your computer's activity.What are they called when operating in this mode?

(Multiple Choice)
4.8/5
(37)

In a(n) _______________ attach, an attacker taps into communications between two systems, covertly intercepting traffic thought to be only between those systems.

(Short Answer)
4.8/5
(38)

Security _______________ are devices that store some unique information that the user carries on his or her person.

(Short Answer)
4.8/5
(25)

What has occurred when a user accesses resources in an unauthorized way?

(Multiple Choice)
4.7/5
(35)

Define social engineering.

(Essay)
4.9/5
(38)

What encryption mechanism can be used for WAN connections (such as T1s and Metro Ethernet) and VPNs?

(Essay)
4.7/5
(35)

What is the difference between a man-in-the-middle (MITM) attack and session hijacking?

(Essay)
4.7/5
(34)

A(n) _______________ is an attack on a vulnerability that wasn't already known to software developers.

(Short Answer)
4.8/5
(31)

What is a checksum?

(Essay)
4.7/5
(31)

Some free anti-malware applications are actually malware and are commonly referred to as _______________.

(Short Answer)
4.9/5
(36)

A device that can prove who you are based on your fingerprint is known as a(n) _______________ device.

(Short Answer)
4.7/5
(36)

What can be used to create entries in the Security Log whenever a user logs on?

(Multiple Choice)
4.8/5
(33)

Those who configure permissions to accounts must follow the principle of _______________.

(Short Answer)
4.8/5
(28)

In the context of viruses, what is a signature?

(Essay)
4.8/5
(24)

What is a rootkit?

(Essay)
4.8/5
(41)

_______________ is a form of malware that encrypts all the data it can get access to on a system, and then asks for money to decrypt your data.

(Short Answer)
4.9/5
(28)

The list of virus signatures that your antivirus program can recognize is called the _______________.

(Short Answer)
4.8/5
(28)

What is encryption on a network?

(Essay)
4.8/5
(36)
Showing 61 - 80 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)