Computer Maintenance Chapter 10 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

What questions should be addressed by organizations developing a security policy?

- What are the possible threats to the assets of the organization? - What is to be done in the case of a security breach? - What assets require protection?

What characteristics describe a rootkit?

A type of malware that grants the attacker full access to the targeted PC.

In what situation would a technician use the fixmbr command at the command prompt in Windows XP?

A virus has corrupted the master boot record.

You want to dispose of a 2.5 terabyte hard drive that contains confidential financial information. What is the recommended procedure to achieve this?

Destroy the hard drive platters; degauss the drive or use third party wiping software to erase the information contained on the platters.

What are some typical physical security precautions that a business can take to protect its computers and systems?

Disable autorun for disk drives, use biometric authentication, use locking mechanisms (cable locks and bolt locks)

What action would help a technician determine if a denial of service attack is being caused by malware?

Disconnect the host from the network.

A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of having a weak password. Which action should the technician take as a preventative measure against this type of attack in the future?

Ensure the security policy is being enforced.

What security precautions will help protect a workplace against social engineering?

Escorting all visitors; ensuring that access cards only allow one person at a time through a single door.

What does a malware detection program look for when running a scan?

Patterns in the programming code of the software on a computer.

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

Phishing

What is typically the primary goal of a DoS attack?

Prevent legitimate users from accessing the targeted network resource.

What characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter?

Protocols and Ports being used by the packets.

All users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, what action should be taken to solve this issue?

Put account restrictions into effect on the PC.

What characteristics describe a worm?

Self replicating; uses network resources to propagate it's code; does these things without user knowledge or interaction.

It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. What actions can be taken to prevent this problem in the future?

Set virus protection software to scan removable media soon as it is plugged in, disable autorun.

What is the name given to the programming code patterns of viruses?

Signatures

A user receives a phone call from a person who claims to represent IT services and then asks the user for confirmation of username and password for auditing purposes. Which security threat does this phone call present?

Social Engineering

A user has reported that a computer web browser will not display the correct homepage even if the default page is reset. What is likely cause of the problem?

The computer has been infected with spyware.

Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

Traffic will be filtered across port 113 until port 25 has been triggered.

What is the most effective method of securing wireless traffic?

WPA2


Conjuntos de estudio relacionados

Dr. Vergaray TAMIU Government Weekly Quiz I

View Set

Chapter 1: Principles of Economics

View Set

AP Government & Politics Mrs. Ivkovich Midterm (Part 3/5)

View Set

PEDS: Nursing Care of Children 1

View Set

Musculoskeletal Trail: Muscle Testing

View Set