M07 Chapter 17 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

What tool is best to use when destroying data on an SSD? Zero-fill utility Low-level format Degausser ATA Secure Erase

ATA Secure Erase

Among the following, which is the best protection against ransomware? Windows File History Carbonite Keylogger software Authy by Twilio

Carbonite

type of spyware that tracks your keystrokes, including passwords adware digital certificate grayware keylogger dictionary attack social engineering tailgating Trojan zombie worm

Keylogger

At a restaurant, you overhear people discussing an interesting case they treated while working in a dental office that day. Which type of regulated data policies are most likely to have been violated? PII PHI PCI GDPR

PHI

As a bank employee, you often work from home and remotely access a file server on the bank's network to correct errors in financial data. Which of the following services is most likely the one you are using to authenticate to the network and track what you do on the network? RADIUS Secure DNS Active Directory TACACS+

RADIUS

What type of employee badge does not have to be swiped by a card reader in order to allow the employee through a door? RFID badge Smart card badge A badge containing a digital certificate Key fob

RFID badge

What software program is an example of password management software? (Choose all that apply) a. KeePass b. LastPass c. Dashlane d. PassLock

a b c

Involving both software and hardware, what technology is meant to protect digital content and prevent piracy? HDMI DRM PPM DVI

DRM

A program that is potentially harmful or potentially unwanted adware digital certificate grayware keylogger dictionary attack social engineering tailgating Trojan zombie worm

Grayware

the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer adware digital certificate grayware keylogger dictionary attack social engineering tailgating Trojan zombie worm

Social Engineering

when someone who is unauthorized follows the employee through a secured entrance to a room or building adware digital certificate grayware keylogger dictionary attack social engineering tailgating Trojan zombie worm

Tailgating

A type of malware that tricks you into opening it by substituting itself for a legitimate program adware digital certificate grayware keylogger dictionary attack social engineering tailgating Trojan zombie worm

Trojan

A root certificate is the original certificate issued by the CA. True False

True

a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge adware digital certificate grayware keylogger dictionary attack social engineering tailgating Trojan zombie worm

Zombie

What is the best way to determine if an email message warning about a virus is a hoax? a. Check websites that track virus hoaxes. b. Scan the message for misspelled words or grammar errors. c. Open the message and see what happens. d. Scan your email inbox for malware.

a

Your boss asks you to work through the weekend to install new software on the applications server that serves up applications to 20 users. The following Monday, all users report they cannot open their data files. After speaking with technical support for the new application, you discover it is not compatible with the old data files. Which type of documentation should you refer to first to address this problem? a. Risk analysis documents b. Back-out plan documents c. Change management documents d. Scope of change documents

a

When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply) a. The password should be at least eight characters long. b. You should not use adjacent keys on the keyboard, such as asdf. c. You should combine uppercase and lower case letters, numbers, and symbols. d. You can use words from a foreign language to make the password more secure.

a b c

What are some of the ways you can use BitLocker Encryption? (Choose all that apply) a. computer authentication using TPM b. user authentication using a certificate c. user authentication using a USB flash drive d. computer and user authentication using a PIN and TPM

a c d

software installed on a computer that produces pop-up ads using your browser adware digital certificate grayware keylogger dictionary attack social engineering tailgating Trojan zombie worm

adware

A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes and you see a blue screen of death. You have important document files on the drive that are not backed up and you cannot afford to lose. What do you do first? a. Try a data-recovery service even though it is expensive. b. Remove the hard drive from the computer case and install it in another computer. c. Try GetDataBack by Runtime Software (runtime.org) to recover the data. d. Use Windows utilities to attempt to fix the Windows boot problem.

b

If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? a. Windows POP technology b. the BIOS c. a feature available on some DVD drives d. your USB keyboard

b

When using the Windows Encrypted File System, what statement is accurate? a. files can be marked for encryption, but not folders b. an encrypted file moved to an unencrypted folder remains encrypted c. EFS only works on NTFS and FAT32 d. you need to download special software to use EFS

b

What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply) a. press Ctrl+End and click Logon Screen b. press Windows key + L c. press Ctrl+Alt+Delete and click Lock this Computer d. Press F1 and click Sleep

b c

What inputs would be considered to be part of a biometric device? (Choose all that apply.) a. keystrokes b. retina c. fingerprint d. voice

b c d

If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? a. a USB port b. an authentication key on the hard drive c. a TPM chip on the motherboard d. a PIN on the BIOS

c

What statement regarding passwords on Windows is accurate? a. it's best to write your password down so you don't get locked out of your computer b. passwords cannot be longer than 14 characters c. by default, accounts with a blank password cannot logon remotely d. letters and numbers are allowed, but no symbols such as '@' or '!'

c

Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term? evidence security roster chain of custody item inventory evidence tracking list

chain of custody

What is the first thing you should do when you discover a computer is infected with malware? a. Turn off system protection b. Update installed anti-malware software. c. Format the hard drive. d. Quarantine the computer.

d

an attack that can be used to crack a long password by trying words and word combinations adware digital certificate grayware keylogger dictionary attack social engineering tailgating Trojan zombie worm

dictionary attack

a code used to identify and authenticate a person or organization sending data over a network adware digital certificate grayware keylogger dictionary attack social engineering tailgating Trojan zombie worm

digital certificate

You sign in to your personal computer with your Microsoft account and then you want to set up your computer as a trusted device to make changes to the account settings. Microsoft sends a code to your cell phone in a text message. You enter the code on a Windows screen. This type of authentication is called: Multifactor authentication Mutual authentication Biometric authentication None of the above

multifactor authentication

A person that secretly peaks at your monitor screen while you work may be doing what? tailgating screen capping shoulder surfing social engineering

shoulder surfing

One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? retinal scanner LoJack token smart card TPM

smart card

You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? shoulder surfing tailgating social engineering session hijacking

tailgating

an infestation designed to copy itself repeatedly to memory, on drive space, or on a network adware digital certificate grayware keylogger dictionary attack social engineering tailgating Trojan zombie worm

worm


Conjuntos de estudio relacionados

Chapter 14 medication administration

View Set

Progress Check 1 (b) Enzyme Chart

View Set