CTI - 120 SEC CHAPTER 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What technology is used by Windows to prevent unauthorized changes to your system?

UAC

SMTP uses TCP port:

25

When using Internet Explorer, how many content zones are there?

4

Windows Firewall

A software component included with Windows that can help prevent hackers or malicious software from gaining access to your computer through network or the internet

windows store

Access to purchase and download apps that use the Windows 8 interface.

encrypt the offline files

Add the address or domain for these emails to the white list

Symptoms of malware are: (Select the best answer)

All of the above

Microsoft account

Allows a user to access resources on a computer and on Microsoft cloud computing services.

_________________ are copies of network files that are stored on your computer so that a user can access them when they are not connected to the network.

Offline Files

Which of the following is used to stop a program from running on a Windows 10 system?

AppLocker

zero day attack

Attack that exploits previously unknown vulnerabilities, so victims have no time (zero days) to prepare for or defend against the attack.

For a more secure environment, all users should be administrators of their computer and not a standard user.

False

If you want to use a local AppLocker rule on all computers in your business, you have to recreate the the rule on every computer. You cannot export the local policy and import to a GPO.

False

Which of the following is a free tool that allows administrators to quickly configure and manage desktops and users using Group Policy?

Security Compliance Manager

SCM 4.0

Security Compliance Manager is a free tool from microsoft that can be used to quickly configure and manage your desktops, traditional data center and private cloud using Group Policy and System Center Configuration Manager

_____________ is an email validation system that is designed to verify if an email is coming from the proper email server.

Sender Policy Framework

LOB App

Line of business app programs and software that are essential to running a business

_______________ is software that is designed to infiltrate or infect a computer, usually with ill intent.

Malware

Which type of account is used with outlook.com and OneDrive and can be used to synchronize a desktop across multiple computers?

Microsoft Account

MBSA

Microsoft Baseline security analyzer a software tool released by MS to determine the security state of a system by assessing missing security updates and less secure security settings within MS windows components

MAPS

Microsoft active protection service the network of windows defender and Microsoft security essentials users that help determine which programs are classified as spyware

A(n) ____________________ is a full replication of the domain database and is located in places where a domain controller is needed but where physical security of the domain controller cannot be guaranteed.

RODC (Read-only Domain Controller)

When a user is notified of an attempt by programs to make changes to their computer, the desktop will be dimmed. This dimming indicates the computer is in ___________________ mode, because other programs can't run until the changes are approved or disapproved.

Secure Desktop

Which of the following is a collection of security settings that can be used to configure client settings?

Security Baseline

Windows Defender can scan a computer on a regular basis and remove or quarantine malware.

True

SPF

Sender Policy Framework an email validation system designed to prevent emails spam that uses source address spoofing. SPF allows administrators to specific in DNS SPF records in the public DNS which hosts are allowed to send email from given domain

_____________ is another name for junk email

Spam

Which type of malware collects personal information or browsing history, often without the user's knowledge?

Spyware

When attempting to change the computer's display settings, which of the following causes a pop-up asking that prompts if a user wants to continue?

UAC

For antivirus software to be effective, it must be kept ___________.

Updated

UAC

User account control a feature that started with Windows Vista and is included with Windows 7. UAC helps prevent unauthorized changes to your computer in doing so it helps protect your system from malware

Which type of malware reproduces itself on a computer without the owner's consent and will often delete or corrupt files?

Virus

An example of a(n) ____________ is a message that states you should delete the win.com file, because it is a virus.

Virus Hoax

backdoor

a conveniences sometimes installed by designers so that they can easily make changes but it can be taken advantage of as the attacker uses it to circumvent security protocols

virus hoax

a message warning the recipient of a nonexistent computer virus threat, usually sent as a chain email that tells the recipient to forward it to everyone he or she knows

What malware gives administrator-level control over a computer system without being detected?

rootkit

Microsoft's built-in antivirus and antispyware program is _____________.

Windows Defender

Which host-based firewall software comes with today's version of Windows?

Windows Firewall

Which program can be used to configure IPsec on a computer running Windows Server 2016?

Windows Firewall with Advanced Security

To control which updates get pushed to clients within an organization, an administrator would use [__] or [____].

Windows Server Update Service System Center Configuration Manager

windows store for business

Windows Store for Business provides a distribution of line-of-business applications to be deployed in an organization. It enables the owner to manage and maintain these custom apps in the same way as you do commercially available apps.

The Windows feature to keep the Windows operating system up to date with patches to security issues is called ______________.

Windows Update

A(n) ________ is a computer program that uses a network to self-replicate.

Worm

Which of the following is most likely the problem when a computer seems to be slow and a different default web page displays?

Your computer has been infected with malware.

Microsoft Edge

a browser made by Microsoft for windows

security template

a collection of configuration settings stored as a text file with and .inf extension

rule collection

a collection of rules used in windows defender

security baseline

a collection of security configuration settings that are to be applied to a particular host in the enterprise

pop up window

a component used on web pages that can be used as part of a useful website controls, but can also be used for annoying advertisements and few may attempt to load spyware or other malicious programs

cookie

a piece of text stored by a users web browser. this file can be used for a wide range of purposes - user identification - authentication - storing site preferences - shopping cart contents

virus

a program that can copy itself and infect a computer without the users consent or knowledge

worm

a self replicating program that copies itself to other computer on a network without any user interventio

rootkit

a software or hardware device designed to gain administrator level control over a computer system without being detected

windows defender

a software product from Microsoft that is intended to prevent, remove, and quarantine spyware in Microsoft Windows

Bayesian filtering

a special algorithm that uses key words to determine whether an email is considered as spam

phishing

a technique base on social engineering where users are asked to supply personal information

spywayre

a type of malware that is installed on a computer to collect a uses personal information or details about his or her browsing habits, often without the users knowledge

polymorphic virus

an armored virus that can changes upon execution to many different forms

pharming

an attack aimed at redirecting a websites traffic to a bogus website

trojan horse

an executable program that appears as a desirable or useful program. As it appears to be desirable or useful use are tricked into loading and executing the program on their system

What technique is used to send you to a fake, but realistic-looking, website to verify your account information?

phishing

Which of the following refers to a social engineering technique in which a user receives an email stating that his account has just expired and he should log on to a legitimate-looking website to fix the problem?

phishing

A ______ allows someone access by circumventing normal security precautions for the application. This gives a remote user unauthorized control of a system or automatically initiates an unauthorized task. This could be created by malware or could be created by developers.

backdoor

BYOD

bring your own device

Viruses and worms often exploit _________________. This can occur when more data is sent than the buffer can hold.

buffer overflows

This fast growing form of malware, encrypts data files and then requests payment from the user to decrypt the files. This type of malware is called ______________.

ransomware

applocker

controls how users access and use programs and files and extend the functionality originally provided by the software restriction policy found in earlier versions of Windows. In Windows 10, AppLocker is located in the Local Group Policy Editor

offline files

copies of network files that are stored on your computer so you can access them when you arent connected to the network

RODC

read only domain controller allows a read only copy of the AD to be stored

SSL is a cryptographic system that uses two keys to encrypt data. The public key is stored in a(n) ____________.

digital certificate

Which of the following tasks is recommended if sensitive or confidential information stored in offline files?

encrypt the offline files

To protect sensitive and confidential information in offline files they should be _____________.

encrypted

windows update

fixes, patches and service packs and update device drivers that should be applied to a windows system. by adding fixes and patches windows will be kept stable and secure

spam

junk email that is usually sent unsolicited

Which of the following is the best thing to do to protect a computer against malware, besides installing an antivirus software package? (Choose the best answer)

keep your machine up to date with the latest security patches

A(n) ______________ attack redirects a website's traffic to a bogus website.

pharming

A(n) _______ is a collection of security settings stored in a text file that can be used to save security configurations, deploy the security settings to a computer or group policy or to analyze compliance of a computer to the desired configuration.

security template

Which of the following refers to a thoroughly tested, cumulative set of hotfixes and other patches?

service pack

ransomware

software that encrypts a computer so that it cannot be used and to be unlocked a price must be paid

malicious software malware

software that is designed to infiltrate's or affect a computer system without the owner's informed consent. The term malware is usually associate with viruses, worms, trojan horses, spyware, rootkits and dishonest adware

UWP

universal windows platform app the Microsoft app

windows server update

wsus a software system that can keep you systems updated with the newest windows and office updates

Attacks based on unknown or recently announced vulnerabilities are _____________. The attack occurs before the developer knows about or has a chance to fix the vulnerability.

zero-day

content zone

zones used to define and help manage security when visiting sites


संबंधित स्टडी सेट्स

ACG 2021 Exam 1 Review (Chapters 1-3) Spring 2016

View Set

Patient Care - Infection Control & management Review Test

View Set

Behavioral Organizational Chapter 8 HARD

View Set