Deck 28: Securing Computers

Full screen (f)
exit full mode
Question
What activity involves simply observing someone's screen or keyboard to get information, often passwords?

A)Shoulder surfing
B)Tailgating
C)Dumpster diving
D)Phishing
Use Space or
up arrow
down arrow
to flip the card.
Question
What has occurred when a user accesses resources in an unauthorized way?

A)Environmental threat
B)Hardware failure
C)Unauthorized access
D)Virus attack
Question
Together, what are viruses, Trojans, and worms called?

A)Encrypted software
B)Open source software
C)Malware
D)Spyware
Question
To lock down security settings on an individual system on a network, what would you use?

A)Group Policy
B)Local Security Settings
C)Account Lockout Policy
D)Password Policy
Question
Sally is a member of multiple groups.A file has been granted different permissions to these different groups.What is Sally's effective permission?

A)Combined permissions of all groups
B)Full Control
C)Most restrictive permissions of all groups
D)No permission until explicitly granter
Question
What is the correct humidity range for computer equipment?

A)0-20 percent
B)10-20 percent
C)30-40 percent
D)60-80 percent
Question
Physical security, authentication, users and groups, and security policies are all aspects of _______________.

A)access control
B)environmental controls
C)database management
D)network locks
Question
How does a computer determine who can or should access it, and once accessed, what that user can do?

A)Decryption
B)Authentication
C)Encryption
D)Transparency
Question
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?

A)Spyware
B)Trojan
C)Virus
D)Worm
Question
What tool allows a computer to determine a user's identity with the most authority?

A)Biometric device
B)Password
C)User name
D)Firewall
Question
What type of virus attempts to change its signature to prevent detection by antivirus programs?

A)Grayware
B)Spyware
C)Polymorph
D)Stealth
Question
Most computer attacks are accomplished through what type of attack?

A)Port scanning
B)Social engineering
C)Buffer overflows
D)Password cracking
Question
A user has a credit card-sized card used to prove her identity with a PIN.What is this card called?

A)Authorization card
B)Biometric card
C)Smart card
D)Task card
Question
A hacker who goes through the garbage looking for information is engaging in _______________.

A)dumpster diving
B)infiltration
C)garbage scanning
D)data destruction
Question
Antimalware programs can passively monitor your computer's activity.What are they called when operating in this mode?

A)Grayware
B)Spyware
C)Virus shields
D)Virus swords
Question
What can be used to create entries in the Security Log whenever a user logs on?

A)Event auditing
B)Object access auditing
C)Event tracking
D)Success logging
Question
What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?

A)Spyware
B)Trojan
C)Virus
D)Worm
Question
What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?

A)Internal virus
B)Inside attack
C)Hacking
D)Social engineering
Question
What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?

A)Phishing
B)Dumpster diving
C)System crashing
D)Tailgating
Question
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?

A)Spyware
B)Trojan
C)Virus
D)Worm
Question
Not all __________ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information.
Question
An intrusion prevention system will _______________.

A)only prevent network intrusion
B)prevent intrusion and also stop attacks as they are occurring
C)prevent network intrusion by shutting down your computer
D)provide batch warnings, but not operate real-time
Question
Port forwarding enables you to open a port in a firewall and direct incoming traffic on that port to a(n) _____________.

A)special firewall program
B)port with a hardware firewall
C)computer on another network
D)specific IP address on your LAN
Question
The tool used to set local policies on an individual system is _______________.
Question
A hardware firewall _______________.

A)uses replicated hardware for security
B)inspects incoming packets individually
C)uses hardware to recover form effects of viruses
D)disconnects hardware from the Internet
Question
When you open or install new software, you must agree to abide by the use and sharing guidelines stipulated by the software copyright holder.This agreement is called the _______________ Agreement.
Question
Most Web sites today use _______________ to encrypt connections.

A)TLS
B)IPS
C)DLP
D)PAP
Question
_______________ reduce the viewing angle of a monitor, making it impossible for anyone to read the screen except those directly in front of it.
Question
A common _______________ attack is where an attacker uses the telephone and convinces a user to give up secure information.
Question
When configured to do so, Windows will create an entry in the Security Log when someone tries to access a certain file or folder-this is called _______________ auditing.
Question
Microsoft's encryption method of choice for a WAN is _______________.

A)CHAP
B)Kerberos
C)MS-CHAP
D)IPsec
Question
The term _______________ refers to any program or code that's designed to do something on a system or a network that the user does not want done.
Question
Which current authentication method is typically used over a LAN?

A)CHAP
B)Kerberos
C)MS-CHAP
D)PAP
Question
Security _______________ are devices that store some unique information that the user carries on his or her person.
Question
Access control is the process of implementing methods to ensure unauthorized users can't access your system.Two primary methods are physical security and _______________.
Question
The tool used to apply policy settings to multiple computers in an Active Directory domain is _______________.
Question
What term describes the process of cleaning up after a virus infection?

A)Remnants
B)Remediation
C)Quarantine
D)Declassification
Question
Those who configure permissions to accounts must follow the principle of _______________.
Question
A device that can prove who you are based on your fingerprint is known as a(n) _______________ device.
Question
Following someone through the door is an example of _______________.
Question
The list of virus signatures that your antivirus program can recognize is called the _______________.
Question
A(n) _______________ is a device or software (or combination of both) used to protect an internal network from unauthorized access from the Internet.
Question
The authentication encryption used in Windows network operating systems is _______________.
Question
A complete program that travels from machine to machine through computer networks and can cause so much activity that it can overload a network is a(n) _______________.
Question
Unsolicited e-mail is more commonly known as _______________.
Question
Classic _______________ (a form of malware) often sneaks onto systems by being bundled with legitimate software.
Question
A(n) _______________ is an attack on a vulnerability that wasn't already known to software developers.
Question
List the four interlinked topics that should be considered when implementing access control.
Question
_______________ is a form of malware that encrypts all the data it can get access to on a system, and then asks for money to decrypt your data.
Question
The scrambling code used to attempt to modify a(n) _______________ virus to prevent detection is actually used as the signature to detect the virus.
Question
A digital certificate is signed by a trusted _______________ that guarantees that the public key you are about to get is actually from the Web server and not from some evil person trying to pretend to be the Web server.
Question
Some free anti-malware applications are actually malware and are commonly referred to as _______________.
Question
Many security appliances include a context-based set of rules called _______________ to help companies avoid accidental leakage of data.
Question
In a(n) _______________ attach, an attacker taps into communications between two systems, covertly intercepting traffic thought to be only between those systems.
Question
Define social engineering.
Question
Unwanted, unknown, or unplanned file downloads are called _______________ downloads.
Question
A(n) _______________ is a program that takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools.
Question
A(n) _______________ is the code pattern of a known virus.
Question
Boot sector viruses that use various methods to hide from antivirus software are known as _______________ viruses.
Question
Surprise browser windows that appear automatically when you visit a Web site are known as _______________.
Question
What is spoofing?
Question
What is the difference between a man-in-the-middle (MITM) attack and session hijacking?
Question
Describe a security token and an RSA token.
Question
How is the Guest account a security risk?
Question
How does an anti-virus program act as a sword (i.e., in active seek-and-destroy mode) in protecting a PC?
Question
What is a botnet?
Question
What is the difference between a virus and a worm?
Question
What tool is used to set security policies on an individual system?
Question
Define malware and list some types of malware.
Question
How can a technician identify an action or content as prohibited?
Question
What are the benefits of incidence reporting?
Question
Describe a smart card.
Question
What is a rootkit?
Question
What is a polymorph virus?
Question
How can rogue applications (rogue anti-malware) be avoided?
Question
What is a Trojan horse?
Question
Define effective permissions.
Question
What is a form of authentication where a user must use two or more factors to prove his or her identity?
Question
What can be used to set security policies for users or computers in a network?
Question
In the context of viruses, what is a signature?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/89
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 28: Securing Computers
1
What activity involves simply observing someone's screen or keyboard to get information, often passwords?

A)Shoulder surfing
B)Tailgating
C)Dumpster diving
D)Phishing
A
2
What has occurred when a user accesses resources in an unauthorized way?

A)Environmental threat
B)Hardware failure
C)Unauthorized access
D)Virus attack
C
3
Together, what are viruses, Trojans, and worms called?

A)Encrypted software
B)Open source software
C)Malware
D)Spyware
C
4
To lock down security settings on an individual system on a network, what would you use?

A)Group Policy
B)Local Security Settings
C)Account Lockout Policy
D)Password Policy
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
5
Sally is a member of multiple groups.A file has been granted different permissions to these different groups.What is Sally's effective permission?

A)Combined permissions of all groups
B)Full Control
C)Most restrictive permissions of all groups
D)No permission until explicitly granter
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
6
What is the correct humidity range for computer equipment?

A)0-20 percent
B)10-20 percent
C)30-40 percent
D)60-80 percent
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
7
Physical security, authentication, users and groups, and security policies are all aspects of _______________.

A)access control
B)environmental controls
C)database management
D)network locks
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
8
How does a computer determine who can or should access it, and once accessed, what that user can do?

A)Decryption
B)Authentication
C)Encryption
D)Transparency
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
9
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?

A)Spyware
B)Trojan
C)Virus
D)Worm
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
10
What tool allows a computer to determine a user's identity with the most authority?

A)Biometric device
B)Password
C)User name
D)Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
11
What type of virus attempts to change its signature to prevent detection by antivirus programs?

A)Grayware
B)Spyware
C)Polymorph
D)Stealth
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
12
Most computer attacks are accomplished through what type of attack?

A)Port scanning
B)Social engineering
C)Buffer overflows
D)Password cracking
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
13
A user has a credit card-sized card used to prove her identity with a PIN.What is this card called?

A)Authorization card
B)Biometric card
C)Smart card
D)Task card
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
14
A hacker who goes through the garbage looking for information is engaging in _______________.

A)dumpster diving
B)infiltration
C)garbage scanning
D)data destruction
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
15
Antimalware programs can passively monitor your computer's activity.What are they called when operating in this mode?

A)Grayware
B)Spyware
C)Virus shields
D)Virus swords
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
16
What can be used to create entries in the Security Log whenever a user logs on?

A)Event auditing
B)Object access auditing
C)Event tracking
D)Success logging
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
17
What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?

A)Spyware
B)Trojan
C)Virus
D)Worm
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
18
What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?

A)Internal virus
B)Inside attack
C)Hacking
D)Social engineering
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
19
What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?

A)Phishing
B)Dumpster diving
C)System crashing
D)Tailgating
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
20
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?

A)Spyware
B)Trojan
C)Virus
D)Worm
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
21
Not all __________ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
22
An intrusion prevention system will _______________.

A)only prevent network intrusion
B)prevent intrusion and also stop attacks as they are occurring
C)prevent network intrusion by shutting down your computer
D)provide batch warnings, but not operate real-time
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
23
Port forwarding enables you to open a port in a firewall and direct incoming traffic on that port to a(n) _____________.

A)special firewall program
B)port with a hardware firewall
C)computer on another network
D)specific IP address on your LAN
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
24
The tool used to set local policies on an individual system is _______________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
25
A hardware firewall _______________.

A)uses replicated hardware for security
B)inspects incoming packets individually
C)uses hardware to recover form effects of viruses
D)disconnects hardware from the Internet
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
26
When you open or install new software, you must agree to abide by the use and sharing guidelines stipulated by the software copyright holder.This agreement is called the _______________ Agreement.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
27
Most Web sites today use _______________ to encrypt connections.

A)TLS
B)IPS
C)DLP
D)PAP
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
28
_______________ reduce the viewing angle of a monitor, making it impossible for anyone to read the screen except those directly in front of it.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
29
A common _______________ attack is where an attacker uses the telephone and convinces a user to give up secure information.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
30
When configured to do so, Windows will create an entry in the Security Log when someone tries to access a certain file or folder-this is called _______________ auditing.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
31
Microsoft's encryption method of choice for a WAN is _______________.

A)CHAP
B)Kerberos
C)MS-CHAP
D)IPsec
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
32
The term _______________ refers to any program or code that's designed to do something on a system or a network that the user does not want done.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
33
Which current authentication method is typically used over a LAN?

A)CHAP
B)Kerberos
C)MS-CHAP
D)PAP
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
34
Security _______________ are devices that store some unique information that the user carries on his or her person.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
35
Access control is the process of implementing methods to ensure unauthorized users can't access your system.Two primary methods are physical security and _______________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
36
The tool used to apply policy settings to multiple computers in an Active Directory domain is _______________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
37
What term describes the process of cleaning up after a virus infection?

A)Remnants
B)Remediation
C)Quarantine
D)Declassification
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
38
Those who configure permissions to accounts must follow the principle of _______________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
39
A device that can prove who you are based on your fingerprint is known as a(n) _______________ device.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
40
Following someone through the door is an example of _______________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
41
The list of virus signatures that your antivirus program can recognize is called the _______________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
42
A(n) _______________ is a device or software (or combination of both) used to protect an internal network from unauthorized access from the Internet.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
43
The authentication encryption used in Windows network operating systems is _______________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
44
A complete program that travels from machine to machine through computer networks and can cause so much activity that it can overload a network is a(n) _______________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
45
Unsolicited e-mail is more commonly known as _______________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
46
Classic _______________ (a form of malware) often sneaks onto systems by being bundled with legitimate software.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
47
A(n) _______________ is an attack on a vulnerability that wasn't already known to software developers.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
48
List the four interlinked topics that should be considered when implementing access control.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
49
_______________ is a form of malware that encrypts all the data it can get access to on a system, and then asks for money to decrypt your data.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
50
The scrambling code used to attempt to modify a(n) _______________ virus to prevent detection is actually used as the signature to detect the virus.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
51
A digital certificate is signed by a trusted _______________ that guarantees that the public key you are about to get is actually from the Web server and not from some evil person trying to pretend to be the Web server.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
52
Some free anti-malware applications are actually malware and are commonly referred to as _______________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
53
Many security appliances include a context-based set of rules called _______________ to help companies avoid accidental leakage of data.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
54
In a(n) _______________ attach, an attacker taps into communications between two systems, covertly intercepting traffic thought to be only between those systems.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
55
Define social engineering.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
56
Unwanted, unknown, or unplanned file downloads are called _______________ downloads.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
57
A(n) _______________ is a program that takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
58
A(n) _______________ is the code pattern of a known virus.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
59
Boot sector viruses that use various methods to hide from antivirus software are known as _______________ viruses.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
60
Surprise browser windows that appear automatically when you visit a Web site are known as _______________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
61
What is spoofing?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
62
What is the difference between a man-in-the-middle (MITM) attack and session hijacking?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
63
Describe a security token and an RSA token.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
64
How is the Guest account a security risk?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
65
How does an anti-virus program act as a sword (i.e., in active seek-and-destroy mode) in protecting a PC?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
66
What is a botnet?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
67
What is the difference between a virus and a worm?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
68
What tool is used to set security policies on an individual system?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
69
Define malware and list some types of malware.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
70
How can a technician identify an action or content as prohibited?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
71
What are the benefits of incidence reporting?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
72
Describe a smart card.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
73
What is a rootkit?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
74
What is a polymorph virus?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
75
How can rogue applications (rogue anti-malware) be avoided?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
76
What is a Trojan horse?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
77
Define effective permissions.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
78
What is a form of authentication where a user must use two or more factors to prove his or her identity?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
79
What can be used to set security policies for users or computers in a network?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
80
In the context of viruses, what is a signature?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 89 flashcards in this deck.