Security Flashcards

1
Q

What is a smart card?

A

A hardware device that has an embedded microchip that contains authentication or security information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a digital signature?

A

An electronic signature that can be used to prove the sender’s identity or a document’s signer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a digital certificate?

A

An electronic file that establishes your identity via a public key infrastructure (PKI) to complete transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is chassis intrusion detection in the BIOS?

A

A physical intrusion detection system that alerts the user if the computer’s cover has been removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of attach is conducted by an email request from a financial institution asking you to log in and change your password using the provided link?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of attack uses drones to obtain email accounts to send spam?

A

A botnet attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the quickest way to lock a Windows 7 computer?

A

Win + L

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How should you protect a portable computer from being stolen in your absence if the portable computer cannot be physically secured using a locking mechanism?

A

Lock the portable computer in a drawer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should you do to ensure that an authorized user does not reveal security information or credentials to any unauthorized person?

A

Implement social engineering mitigation techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which guidelines should you refer to if you find that someone has breached the security of the server room?

A

The company’s security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the FIRST action you should perform if you find that your fellow technician has left the door of the server room open?

A

Close the door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which software gather’s the user’s information through the user’s internet connection without the user’s knowledge?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which recommended file system format for Windows XP enables advanced performance, security, and reliability features?

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two ways that you can encrypt a file?

A
  • Right-click the file, select Properties, and click Advanced.
  • Use the Cipher command
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you enable some users to access certain files and restrict others from accessing the same files?

A

Set different permissions for the users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four primary user groups on a Windows XP computer?

A

Administrators, Power Users, Users, and Guests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which two passwords can be configured using the BIOS setup utility?

A

Supervisor password and user password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which password can be configured to prevent unauthorized access to the BIOS setup utility?

A

Supervisor password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which password prevents unauthorized users from booting up the computer?

A

User password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What should a technician do when facing an error ‘SSL certificates are no longer valid’?

A

Clear the SSL slate in Internet Explorer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which type of software can assist you in protecting your computer against virus-related problems?

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why should you not store passwords in a text file on your desktop?

A

Someone can open the file and read your passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In a Microsoft Active Directory domain, what must a user’s password contain by default?

A
A password must contain three out of the following four conventions:
• Upper-case letters
• Lower-case letters
• Numeric or special characters
• At least 8 characters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What should an administrator tell a user about passwords?

A

Memorize the password, and do not tell anyone the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the maximum length of the Windows password that is supported by Windows XP?

A

127 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What can you configure on a Microsoft Active Directory domain to ensure that all Windows XP and Vista users have passwords that adhere to the company security policy?

A

Group Policy object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the latest encryption standard that must be used to protect the data being transmitted over a wireless network?

A

Wi-Fi Protected Access, second generation (WPA2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the three levels of encryption standards for wireless networks?

A

WEP, WPA, and WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which tool helps determine the security state of an organization?

A

Windows Baseline Security Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What should you do if you overhear a private conversation between two managers of a different department?

A

Keep the information confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which security protocol is used to secure wireless local area networks (WLANs) defined in the IEEE 802.11 wireless networking standard?

A

Wired Equivalent Privacy (WEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What type of virus generally affects the system by attaching itself to MS-Office applications?

A

Macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What type of virus can infect system files and boot sectors of a computer system?

A

Multipart and boot sector viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does a polymorphic virus do?

A

Produces multiple operational copies of itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does a self-garbling virus do?

A

Formats its own code to prevent antivirus software from detecting it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What does a stealth virus do?

A

Hides the changes it makes as it replicates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a Trojan horse?

A

Malware that is disguised as a useful utility but embeds malicious code in itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a virus?

A

Malicious software (malware) that relies upon other application programs to execute and infect a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What uses tracking cookies to collect and report on a user’s activities?

A

Spyware

40
Q

Which attributes or details of an employee can be used by biometric devices?

A
They include:
• Fingerprints
• Face
• Signature
• Iris
• Retina
• Hand geometry
41
Q

What are two common tools from Microsoft to fight malware?

A

Windows Defender and Microsoft AniSpyware

42
Q

What is the purpose of BitLocker in Windows Vista?

A

Drive encryption

43
Q

Which wireless security protocol is most secure: WPA, WPA2, or WEP?

A

WPA2

44
Q

Which Windows feature can cause your system to be reinfected with a virus?

A

The System Restore feature

45
Q

In biometrics, which security is worse: a false negative or a false positive?

A

False positive

46
Q

In biometrics, what is a false positive?

A

When someone who is NOT supposed to have access to the system is erroneously granted access

47
Q

In biometrics, what is a false negative?

A

When someone who is supposed to have access to the system is erroneously denied access

48
Q

What is adware?

A

Software installed on your computer that automatically displays advertisements when the software is running

49
Q

Which security device protects the local network from outside hacking by blocking ports and filtering MAC addresses?

A

A firewall

50
Q

What is the number of characters in a 256-bit WEP key?

A

58

51
Q

What is the number of characters in a 104-bit WEP key?

A

26

52
Q

What is the number of characters in a 40-bit WEP key?

A

10

53
Q

Which command is used to run the driver installation of wireless connection?

A

DEVMGMT.MSC

54
Q

Which encryption key is used to provide security along with the service set identifier (SSID) to access a secure wireless network?

A

The Wired Equivalent Privacy (WEP) key

55
Q

Where is the Security Center icon located in Windows XP?

A

In Control Panel

56
Q

The Security Center icon in Windows XP was introduced with which Service Pack?

A

SP2

57
Q

In which specific area of a hard disk drive does a boot-sector virus place its starting code?

A

Master Boot Record (MBR)

58
Q

What should you do to effectively use your virus scanner to protect your computer from mail-, Wed-, and removable media-borne viruses?

A

Configure the virus scanner to scan email, web pages, and removable media as well as your hard drive

59
Q

What type of attack takes the control of a session between a server and a client?

A

Session hijacking

60
Q

Which device can be installed to monitor visitor entry into a server room when there is not enough manpower to escort the visitor?

A

Video surveillance cameras or closed-circuit television (CCTV)

61
Q

Which type of cards use a public key infrastructure (PKI) for secure access?

A

Smart cards

62
Q

Which mode of communication does Bluetooth wireless technology use?

A

Radio waves

63
Q

Which three types of characters can be used in combination to set a strong password in Windows XP?

A

Alphabetic, numeric, and special characters

64
Q

Which wizard is used to setup a wireless connection in Windows XP?

A

Wireless Network Setup Wizard

65
Q

Which tab on the Wireless Connection Properties dialog box of Windows XP SP1 or SP2 should be used to specify the name of the server to be used for authentication?

A

The Authentication tab

66
Q

What should you do if your smart card is stolen?

A

Get it inactivated and replaced

67
Q

Which authentication method uses a small card with an embedded silicon chip which stores information on it?

A

Smart card authentication

68
Q

Which authentication method uses fingerprint recognition as a method to identify an individual?

A

Biometric authentication

69
Q

Which authentication method can be used to identify a person on the basis of that person’s physiological or behavioral characteristics?

A

Biometric authentication

70
Q

Which option should be selected in Control Panel > Administrative Tools to create a new local group?

A

Computer Management

71
Q

Which tab under the User Accounts option in Control Panel will you use to ensure that a user must press the Ctrl+Alt+Del keys before logging in?

A

The Advanced tab

72
Q

If a drive or a partition is converted from FAT32 to NTFS, which step needs to be performed to convert it back to FAT32 in Windows XP?

A

Format the drive or partition

73
Q

What should you do to notify a user before deleting a shared folder from a network computer?

A

Send a Console Message by navigating to Computer > Management > Shared Folders > Shares > All tasks > Send Console Message

74
Q

Which step should be performed first while deleting a shared folder from a network computer?

A

Notify all users by sending a console message

75
Q

Which three permissions are given to a user by default when a folder is shared on a Windows XP computer?

A

Read and Execute, List Folder Contents, and Read permissions

76
Q

What is the recommended process when you need to assign a group of permissions to a set of users?

A

Create a group. Assign the permissions to the group. Add all the user accounts to the group.

77
Q

Why should you disable all unused features of your Web browser?

A

To provide the best security for your web browser

78
Q

What is the term for creating TCP/IP packets using somebody else’s IP address?

A

IP spoofing

79
Q

Where on a Windows XP computer can you find information about the user accounts that previously logged into the computer?

A

Security Log in Event Viewer

80
Q

Which type of attack attempts to disrupt access to the server, which is forced to re-authenticate on each web page?

A

Distributed denial-of-service (DDoS)

81
Q

On which protocol does an attacker attack by taking advantage of the security flaws during network implementation to carry out land attacks?

A

Transmission Control Protocol/Internet Protocol (TCP/IP)

82
Q

Which five main attack vectors are used by social engineering hackers?

A

Online, telephone, waste management, personal approaches, and reverse social engineering

83
Q

What is the name of the technique of circumventing technological security measures by manipulating people to disclose secure information?

A

Social engineering

84
Q

What must you consider when calculating the effective permissions of a user accessing files through a network share on a remote computer with a disk that is formatted in NTFS?

A

You must determine the effective permissions by analyzing the share permissions and NTFS permissions

85
Q

When you sign an email with a(n) _______________, the email cannot be changed or modified without changing the digital signature.

A

Encrypted signature

86
Q

How do you send an encrypted email message?

A

Sign the message with an encrypted signature to the message so that the recipient can read the message without decrypting it and only needs decryption to verify the sender’s identity

87
Q

Which authentication standard is enabled by default to secure network access for wireless network on Windows XP Service Pack 1 (SP1)?

A

IEEE 802.1x authentication standard

88
Q

Which two protocols provide encrypted communications between 902.11x wireless clients and wireless access points?

A

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA)

89
Q

Which program is used to list frequently accessed shared folders on Windows XP computer?

A

My Network Places

90
Q

Which process allows a shared folder from another computer to appear as a separate disk drive on your computer?

A

Drive mapping

91
Q

Which technology used by cable modems varies the data transmission rate based on the number of users connected to the cable?

A

Shared connection technology

92
Q

How many bit encryption key of initialization vector (IV) is generated and appended to the Wireless Equivalency Protocol (WEP) encryption key?

A

24-bit

93
Q

What should you configure when setting up a wireless connection?

A

Configure the SSID and decide which encryption standard to use

94
Q

Which protocol is used to indicate the subtype set authentication, whether or not encryption and authentication are used in data frames and management frames?

A

Wired Equivalent Privacy (WEP)

95
Q

What are the two most commonly known types of malware?

A

Viruses and Trojan horses

96
Q

What software damages or disrupts a system without the owner’s permissions?

A

malware