Module 5 Flashcards

1
Q

Three types of users

A

Administrator
Guest
Standard User
Power User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

System32 folder does what

A

contains windows system directory.

required to running everything….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Windows folder does what

A

contains windows software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

single sign-on

A

Logging into other network resources when you log into the network so you aren’t prompted each time you attempt to access a network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

physical security efforts

A
locked door
shredding
id badges
rfid badge
biometrics
retinal scans
privacy filter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tailgating

A

Sneaking in as folks leave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

physical destruction options

A

shredder

drill for HD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EMI

A

Electromagnetic Interference
Common for network interference
Not the same as ESD. Does not destroy HD data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ESD

A

Electrostatic discharge.

Could destroy an HD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

degaussing tool

A

Degaussing involves applying a strong magnetic field to initialize the media (this is also referred
to as disk wiping). This process helps ensure that information doesn’t fall into the wrong hands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Standard format

A

File allocation tables have been told the info is gone, and sector is free to write to. But the info is still there.

This as opposed to low level format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Low Level Format

A

Best perfect way to delete data on a hard drive. Superior to standard format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Windows Defender

A

Built-in tool that looks for Malware behind the scenes.
Looks for specific signatures of files.
Not very powerful. Does not protect email, for example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus

A

Attaches itself to a program or a file that enables it to spread from computer to computer.

Almost all viruses are attached to an executable file, meaning someone must open/run/click on it for it to run and travel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Worm

A

Can travel without human intervention.

Consumes memory, network bandwidth, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trojan Horse

A

programs that enter a system or network under the guise of another program.

A Trojan horse may be included as an attachment or as part of an installation program. The Trojan horse can create a back door or replace a valid program during installation

17
Q

Evidence of Malware

A
Decreased system performance
Disappearance of data
Data modification
Failure to launch OS or software
High network activity
Increase in file size
Coworkers report suspicious behavior
18
Q

Shoulder Rufing

A

Watching over someone’s shoulders to access info…

19
Q

What windows account should you probably disable

A

Guest

20
Q

SOHO

A

small office / home office

21
Q

Some things to do to secure a SOHO

A
Change default user names / passwords
Change SSID
Set up wireless encryption
Disable SSID broadcast
Enable MAC filtering
Antenna and Access Point placement to limit access
Assign static IP addresses
Disable ports
22
Q

Dumpster diving

A

Companies normally generate a huge amount of paper, most of which eventually
winds up in dumpsters or recycle bins. Dumpsters may contain information that is highly
sensitive in nature (such as a password a user has written on a piece of paper because they
haven’t memorized it yet).

23
Q

Rootkits

A
Rootkits are software
programs that have the ability to hide certain things from the operating system; they do so
by obtaining (and retaining) administrative-level access.
24
Q

vishing

A

combine phishing with Voice over IP (VoIP)
rise in VoIP now makes it possible for someone to call you
from almost anywhere in the world, without the worry of tracing/caller ID/and other features
of the land line, and pretend to be someone they are not in order to get data from you.

25
Q

spear phishing

A

attacker uses information that the tar-
get would be less likely to question because it appears to be coming from a trusted source. (An email from the boss, for example)

26
Q

whaling

A

phishing, or spear phishing, for so-called “big” users,

27
Q

Steps of troubleshooting theory

A
Identify the problem
Gathering Information
Establishing a Theory
Testing Solutions
Establishing a Plan of Action
Verifying Functionality
Documenting the Work
28
Q

POST steps

A

checking the CPU
checking the RAM
checking for the presence of a video card
verifying basic hardware functionality.