Deck 17: Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 17: Security
1
The file system has no impact on how secure a computer will be against intruders.
False
2
Individual personal computers can be secured through the use of a smart card and the user's PIN number.
True
3
Locking a workstation immediately can be achieved by pressing the Windows Logo key+L abruptly on the keyboard to log off the user.
True
4
Pretexting is a method of social engineering that can be stopped by both users and antiphishing programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The power users group has the least amount of permissions out of all the accounts on a Windows system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
If a folder is moved to a different location of the same volume, the folder inherits permissions of the parent folder to which it was copied.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The BIOS setup password can be reset by simply removing the battery for several minutes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
If a wireless router or WAP is configured with a provided encryption type, that identical type must also be configured among wireless clients.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Unused wireless connections within Windows XP and Windows Vista should be reviewed and deleted when no longer used.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
WAP and wireless routers often have firmware updates. These updates solve only operational problems, whereas added features and security enhancements remain neglected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
By default NTFS encrypts files and folder contents.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Bit Locker encrypts the entire disk while EFS encrypts only individual files and folders.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The Power Users group can do everything administrators can do except install driver updates.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
When an authentication server is used on a network, users need only a local login credential to access network resources.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Biometrics refers to the biological information gathered from a human body to authenticate a user. All the following are types of biometrics except ________?
A) Fingerprint reader
B) Retina scanner
C) Personal identification card
D) Voice recognition
A) Fingerprint reader
B) Retina scanner
C) Personal identification card
D) Voice recognition
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Two-way firewalls provide protection against unauthorized ______ and ______ traffic.
A) Malware
B) Virus
C) Outbound
D) Inbound
A) Malware
B) Virus
C) Outbound
D) Inbound
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
All the following are standards for wireless encryption except ________?
A) WEP
B) WPA
C) WPA2
D) EFS
A) WEP
B) WPA
C) WPA2
D) EFS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following wireless encryption standards uses AES encryption?
A) WEP
B) WPA
C) WPA2
D) EFS
A) WEP
B) WPA
C) WPA2
D) EFS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
To prevent an attacker from detecting your wireless network signals, what should be changed from the manufacturer defaults?
A) Change the SSID.
B) Disable the SSID broadcast.
C) Add MAC address filtering.
D) Change the default administrator password.
E) All the options provided are correct.
A) Change the SSID.
B) Disable the SSID broadcast.
C) Add MAC address filtering.
D) Change the default administrator password.
E) All the options provided are correct.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following features can be used as a simple firewall within wireless routers and WAPs?
A) Filtering
B) Access logs
C) VPNs
D) NAT
A) Filtering
B) Access logs
C) VPNs
D) NAT
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What types of Local Security Policies can be applied to protect data residing on a system?
A) Enable auditing.
B) Shutdown.
C) Interactive logon.
D) All answers provided are correct.
A) Enable auditing.
B) Shutdown.
C) Interactive logon.
D) All answers provided are correct.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Securing backups with password protection gives added protection. However, if the backup program does not support password protection, what must be done to the backup media?
A) Leave it on the system that was backed up.
B) Place it on your supervisor's desk.
C) Physically secure it to prevent access.
D) All answers provided are correct.
A) Leave it on the system that was backed up.
B) Place it on your supervisor's desk.
C) Physically secure it to prevent access.
D) All answers provided are correct.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Social engineering is composed of a variety of methods to manipulate users into performing actions or providing information. Which of the following are among the many methods used during social engineering?
A) Pretexting
B) Phishing
C) Baiting
D) All answers provided are correct.
A) Pretexting
B) Phishing
C) Baiting
D) All answers provided are correct.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
There are three standard account levels within Windows XP. Which of the following is not a standard account level?
A) Multiuser account
B) Guest account
C) Administrator account
D) Limited account
A) Multiuser account
B) Guest account
C) Administrator account
D) Limited account
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following features within the BIOS can be enabled to prevent unauthorized users from altering BIOS setup information?
A) Boot sector virus protection
B) BIOS setup password
C) Boot sequence
D) BIOS HDD password
A) Boot sector virus protection
B) BIOS setup password
C) Boot sequence
D) BIOS HDD password
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following settings could affect a user from joining a wireless network? (Choose all that apply.)
A) Incorrect SSID
B) Incorrect encryption type
C) Incompatible wireless adapter type
D) Incompatible operating system
A) Incorrect SSID
B) Incorrect encryption type
C) Incompatible wireless adapter type
D) Incompatible operating system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Windows XP can be installed on either _____ or ______ file systems.
A) FAT12
B) FAT16
C) FAT32
D) NTFS
A) FAT12
B) FAT16
C) FAT32
D) NTFS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A software ______ is a program designed to block unauthorized data packers while permitting authorized data packets on a network.
A) Router
B) Filter
C) Policy
D) Firewall
A) Router
B) Filter
C) Policy
D) Firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
EFS files can be opened only by which of the following except ________?
A) The domain user
B) The owner who encrypted them
C) The administrator
D) EFS keyholders
A) The domain user
B) The owner who encrypted them
C) The administrator
D) EFS keyholders
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
One reason why an administrator might give someone the list permission but not the read permission is
A) The person is a guest with only a temporary login.
B) The person is a member of the Power User's group.
C) The person is a low-level employee who is not allowed to read files.
D) The person's role is to back up important data without knowing the contents.
A) The person is a guest with only a temporary login.
B) The person is a member of the Power User's group.
C) The person is a low-level employee who is not allowed to read files.
D) The person's role is to back up important data without knowing the contents.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Login Authentication involves verifying which of the following? (Choose all that apply.)
A) Something the user knows
B) Something the user has
C) Something the user says
D) Something the user does
E) Something the user is
F) All the above
A) Something the user knows
B) Something the user has
C) Something the user says
D) Something the user does
E) Something the user is
F) All the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The Local Security Policy can be use to accomplish which of the following? (Choose all that apply.)
A) Disable the interactive logon.
B) Enable auditing.
C) Format the system drive.
D) Unencrypt a drive encrypted by BitLocker.
A) Disable the interactive logon.
B) Enable auditing.
C) Format the system drive.
D) Unencrypt a drive encrypted by BitLocker.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
If you copy a folder to a location on the same drive, or to different drive, which of the following describes the effect this action has on the permissions.
A) The folder retains its original permissions.
B) The folder permissions must be re-created by the administrator.
C) The person who copied the file now has full control if he did not have it before.
D) The folder inherits the permissions of the target parent folder it was copied into.
A) The folder retains its original permissions.
B) The folder permissions must be re-created by the administrator.
C) The person who copied the file now has full control if he did not have it before.
D) The folder inherits the permissions of the target parent folder it was copied into.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match the following terms with their description
-Biometrics
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
-Biometrics
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match the following terms with their description
-Firewall
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
-Firewall
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match the following terms with their description
-SSID
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
-SSID
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Match the following terms with their description
-EFS
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
-EFS
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match the following terms with their description
-Virus
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
-Virus
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match the following terms with their description
-Malware
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
-Malware
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match the following terms with their description
-Smart card
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
-Smart card
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Match the following terms with their description
- Password management
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
- Password management
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Match the following terms with their description
-Incident reporting
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
-Incident reporting
A) The biological information gathered from a human body to authenticate a user
B) A network device or software designed to block unauthorized data packers while permitting authorized data packets on a network
C) An identifier used to provide information on a particular LAN
D) A file system driver that provides encryption at the file-system level
E) A program that can copy itself and infect a system without permission
F) A software-based program that can infiltrate a system and conduct damage without the user's knowledge
G) A device used to store information and contain a simple microprocessor or RFID chip
H) The process to secure user passwords to accounts through the use of local security policy and group policy
I) Procedures that organizations follow for reporting security-related occurrences.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Match the following types of data threats
-Virus
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
-Virus
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Match the following types of data threats
-Trojan horse
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
-Trojan horse
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Match the following types of data threats
-Rootkit
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
-Rootkit
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Match the following types of data threats
-Spyware
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
-Spyware
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Match the following types of data threats
-Adware
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
-Adware
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Match the following types of data threats
-Spam
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
-Spam
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Match the following types of data threats
-Phishing
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
-Phishing
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Match the following types of data threats
-Baiting
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
-Baiting
A) A program that infects files in an operating system to make the system perform unauthorized actions
B) A program that hides behind the name of a presumed utility or system process but actually installs unauthorized software
C) Helps prevent detection of malware
D) Provides for surveillance and recording of computer-related activities
E) Software that displays commercial content without invitation
F) Unwanted email sent by bulk emailers
G) Soliciting of personal information by pretending to be an authoritative representative
H) Providing easy access to a desirable data transfer object such as a USB memory stick for the purpose to run unauthorized software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck