CMT235 Chapter 18

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What keystroke should you press to get a logon window if you don't use the welcome screen?

Ctrl+Alt+Delete

True or False: After initially installing Windows 7, you need to disable the Guest account so nobody can use it.

False

True or False: On a peer-to-peer network, authentication is the responsibility of the domain.

False

What software program is an example of password management software? (Choose all that apply.)

KeePass Dashlane LastPass

What technology can be used to locate a device such as a laptop after it has been stolen?

LoJack

When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.)

The password should be at least eight characters long. You should combine uppercase and lower case letters, numbers, and symbols. You should not use adjacent keys on the keyboard, such as asdf.

A type of malware that tricks you into opening it by substituting itself for a legitimate program

Trojan

True or False: A root certificate is the original certificate issued by the CA.

True

True or False: Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.

True

True or False: Using Group Policy, you can set security policies to help secure a workstation

True

True or False: Using Group Policy, you can set security policies to help secure a workstation.

True

If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?

a TPM chip on the motherboard

user authentication using a USB flash drive

a TPM chip on the motherboard

software installed on a computer that produces pop-up ads using your browser

adware

When using the Windows Encrypted File System, what statement is accurate?

an encrypted file moved to an unencrypted folder remains encrypted

What statement regarding passwords on Windows is accurate?

by default, accounts with a blank password cannot logon remotely

Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term?

chain of custody

What are some of the ways you can use BitLocker Encryption? (Choose all that apply.)

computer authentication using TPM computer and user authentication using a PIN and TPM user authentication using a USB flash drive

What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software?

copyright

What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

degausser

an attack that can be used to crack a long password by trying words and word combinations

dictionary attack

a code used to identify and authenticate a person or organization sending data over a network

digital certificate

A program that is potentially harmful or potentially unwanted

grayware

What command can be used to take full access of a file?

icacls

What statement is true regarding the Guest account in Windows 7?

it is disabled by default

type of spyware that tracks your keystrokes, including passwords

keylogger

Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?

malware signatures

When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?

man-in-the-middle

Using a PIN or password in addition to TPM is an example of what type of authentication?

multifactor

What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.)

press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer

CryptoLocker is an example of what type of malware?

ransomware

What inputs would be considered to be part of a biometric device? (Choose all that apply.)

retina fingerprint voice

What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

rootkit

A person that secretly peaks at your monitor screen while you work may be doing what?

shoulder surfing

One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?

smart card

the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer

social engineering

You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

tailgating

when someone who is unauthorized follows the employee through a secured entrance to a room or building

tailgating

If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?

the BIOS

What does the presence of the Cydia app on an iOS device indicate?

the device has been jailbroken

an infestation designed to copy itself repeatedly to memory, on drive space, or on a network

worm

a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge

zombie


Ensembles d'études connexes

History Text Book Notes and Quiz #13 - 15.4

View Set

BOIL 366 Reg_Gen_Exp_bacteria_lac__ara__etc

View Set

Canvas Module 6: Quiz (from Textbook Module 8)

View Set

ch 7 legal dimensions of nursing practice

View Set

Algebra 2 (2-1 relations and functions)

View Set

JBL Questions Chapter 33 Face and Neck Trauma

View Set

Front & Back of the House Positions

View Set