Chapter 18 Test

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

List five of the different criteria that make up a secure password?

1. Eight or more characters 2. Use uppercase, lowercase, interchangeably 3. Do not use numbers or letters in order like 1234, or abcd 4. Use symbols 5. Do not use actual words

What is a Trojan, and how is it installed?

A Trojan is a type of malware that does not need a host in order to replicate. This type of malware hides by pretending to be a legitimate program.

After initially installing Windows 7, you need to disable the Guest account so nobody can use it. True or false

False

On a peer-to-peer network, authentication is the responsibility of the domain. True or false

False

What is a rootkit and why is it so difficult to detect?

It is one of the many types of malware that is hard to detect mainly because it loads before antivirus software has a chance to catch it. It can also hijack internal windows components.

What software program is an example of password management software? (Choose all that apply.) LastPass PassLock KeePass Dashlane

LastPass KeePass Dashlane

What does the presence of the Cydia app on an iOS device indicate? A rootkit has been installed on the device There is spyware software installed on the device The device has been jailbroken The device is infected with a worm

The device has been jailbroken

Using Group Policy, you can set security policies to help secure a workstation. True or false

True

Under what circumstances can a blank password be more secure than a non-blank password?

When using a blank password you cannot login remotely. So if you never leave say your house with that computer, then its less likely they can login. That is more secure than having a weak password that you use when you leave your house. Basically if you do not sign in remotely and trust the location of your device then a blank password can be more secure.

Describe Windows Firewall.

Windows Firewall is a software designed to block a local computer from being disrupted from the internet. This can prevent harmful software to infect the system. If another computer on the same network as the computer gets infected and tries to spread and replicate through the same network, then the computer can be protected since it is a local firewall. Also called a host firewall, or personal firewall.

With respect to the default users and password settings, how can you use Group Policy to make your system more secure?

You can set passwords using Group Policy, and who has password and who does not. You can audit failed login ins being able to see the user and the time they logged in at. Also see successful log ins and the user and see the times. You can also use scripts for log ins.

If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? a USB port a PIN on the BIOS a TPM chip on the motherboard an authentication key on the hard drive

a TPM chip on the motherboard

When using the Windows Encrypted File System, what statement is accurate? an encrypted file moved to an unencrypted folder remains encrypted EFS only works on NTFS and FAT32 files can be marked for encryption, but not folders you need to download special software to use EFS

an encrypted file moved to an unencrypted folder remains encrypted

What statement regarding passwords on Windows is accurate? passwords cannot be longer than 14 characters by default, accounts with a blank password cannot logon remotely it's best to write your password down so you don't get locked out of your computer letters and numbers are allowed, but no symbols such as '@' or '!'

by default, accounts with a blank password cannot logon remotely

Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term? evidence security roster chain of custody evidence tracking list item inventory

chain of custody

What inputs would be considered to be part of a biometric device? (Choose all that apply.) retina voice keystrokes fingerprint

fingerprint retina voice

What command can be used to take full access of a file? perms takeown icacls attrib

icacls

When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? rootkit zombie brute-force man-in-the-middle

man-in-the-middle

What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.) press Ctrl+End and click Logon Screen press Ctrl+Alt+Delete and click Lock this Computer press Windows key + L Press F1 and click Sleep

press Ctrl+Alt+Delete and click Lock this Computer press Windows key + L

CryptoLocker is an example of what type of malware? worm man-in-the-middle zero-day attack ransomware

ransomware

What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? worm Trojan horse adware rootkit

rootkit

A person that secretly peaks at your monitor screen while you work may be doing what? tailgating shoulder surfing social engineering screen capping

shoulder surfing

If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? the BIOS your USB keyboard a feature available on some DVD drives Windows POP technology

the BIOS

A root certificate is the original certificate issued by the CA. True or false

true

What are some of the ways you can use BitLocker Encryption? (Choose all that apply.) user authentication using a certificate computer and user authentication using a PIN and TPM user authentication using a USB flash drive computer authentication using TPM

user authentication using a USB flash drive computer authentication using TPM user authentication using a certificate


Ensembles d'études connexes

GEL Test 2 (14, 7, 5, 3) questions/book questions

View Set

Chapter 11: Output and Costs Study Modules

View Set

EMT Chapter 27: Trauma Overview: The Trauma Patient and the Trauma System post test

View Set

Chapter 9 - Health Insurance Underwriting

View Set

Lab 16-2: Configuring Windows Defender Firewall

View Set

Persistent Storage in Android Applications

View Set

Interpersonal Communication Final (Exam 2 Q's)

View Set

IBA Final Practice I-A, I-B, I-C

View Set

EAQ- Lewis Med Surg CH.27, Nursing Management: Upper Respiratory Problems- Problems of Pharynx, Trachea, and Larynx

View Set

EXPH Lab Exam 1: Post Lab Questions

View Set