hpaer 10 study

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

However, professional thieves know how to break through this type of destruction. Data recovery has been known to reach ___ levels of overwrites because each bit is slightly ___ from the one under it.

14 Offset

A document that can help educate users is an AUP, which explains what users can and cannot do on the corporate network or with company data, and the penalties for violations. AUP stands for ______.

Acceptable use policy

Corporate networks manage ACLs through ___ Directory on a Windows domain. ACL stands for ___.

Active Access control list

Controlling access to computer resources is done by authenticating and ____ a user or process.

Authorizing

If anti-malware software reports a rootkit is present, but cannot delete it, the best solution is to immediately disconnect the computer from the network, ___ your important data, ___ your hard drive, and ___ Windows.

Back up Format Reintall

Many mobile devices, such as iPads and some laptops, have fingerprint scanners built in. Other forms of ___ data include ___ scans (scans parts of the eye), handprints, face recognition, and voice recognition.

Biometric Retinal

In some situations, a ___ Windows password might be more secure than an easy-to-guess password. That's because you cannot authenticate to a Windows computer from a ___ computer unless the user account has a password.

Blank Remote

A hacker might build an entire network of zombies, which is called a ___ (a network of robots).

Botnet

Recall that the Group Policy utility controls what users can do with a system and how the system is used and is available with ___ and ___ editions of Windows.

Business Professional

Power-on passwords include a supervisor password (required to ___ UEFI/BIOS setup), user password (required to use the system or ___ UEFI/BIOS setup), and a drive lock password (required to access the ___).

Change View Hard drive

You can use a ___ to destroy magnetic devices, but it doesn't work on a ___ hard drive or other flash media that do not use a magnetic surface to hold data.

Degausser Solid-state

A more secure method of sign in, called secure sign in or secure logon, requires the user to press Ctrl + Alt + _____ to get to a sign-in screen.

Delete

Because most anti-malware software to one degree or another relies on Windows tools and components to work, the rootkit is not detected or cannot be ___ if the Windows tools themselves are ___.

Deleted Infected

A ___ attack can be used to crack a password by trying words in a dictionary. It can be combined with a ___ force attack.

Dictionary Brute

When a computer is on a Windows domain, the ___ is responsible for authentication. For a peer-to-peer network, authentication must happen at the ___ computer.

Domain Local

A user might forget a password and, as an administrator, you can reset the password. However, resetting a password locks the user out from ____ files, email, or personal certificates saved on the computer and from using Internet or network passwords stored on the computer.

Encrypted

A key ___ is a security token (shown in Figure 10-24). The number on it changes every ___seconds.

FOB 60

You can move a TPM chip from one motherboard to another.

False

To keep other people from viewing a monitor screen, you can install a _____ that fits over the screen to prevent it from being read from a wide angle.

Filter

Email providers often offer email ____to filter out suspicious email messages based on databased of known ___ and spammers. Corporations might route incoming and outgoing email through a ___ server for filtering.

Filtering Scams Proxy

BitLocker Drive Encryption in Windows professional and business editions locks down a ____ by encrypting the entire Windows volume and any other volume on the drive.

Hard drive

A SOHO router can serve as a ___ firewall to protect its network from attack over the Internet.

Hardware

A personal firewall, also called a ___ firewall or ___ firewall, is software installed on a personal computer to protect the computer.

Host Application

IDS stands for ___. IPS stands for ___.

Intrusion detection system Intrusion prevention system

An example of spyware is a ___ that tracks all your keystrokes and can be used to steal a person's identity and private data.

Keylogger

Some laptops contain the ___ technology on the mother board to support the laptop-tracking software Absoute LoJack by Absolute Software (absolute.com).

LoJack

If you install the LoJack software on your laptop and the laptop is stolen, Absolute can ___ down your hard drive and ___ down the laptop.

Lock Track

Often you are tricked into clicking a link in the email message, which takes you to an official -looking site complete with corporate or bank ___ where you are asked to enter your user ID and password to enter the site. This tactic is called ___.

Logos Spoofing

Malware is a shorthand for ___. It is any unwanted program that means you harm and is transmitted to your computer without your knowledge. ___ is any annoying and unwanted program that might or might not mean you harm, for example, ___ that produces all those unwanted pop-up ads.

Malicious software Grayware Adware

_____ can sometimes display a false sign-in screen to trick users into providing user account passwords.

Malware

In a ______ attack, the attacker intercepts communication between two parties and reads and/or alters the content of messages.

Man-in-the-middle

A _____ consists of two doors on either end of a small entryway where the first door must close before the second door can open.

Mantrap

For best security, a password can be required at every startup in addition to TPM. Using this method, both the __(not-answered)__ and the user are authenticated. This practice is an example of ___ (MFA). See p. 482 for more details on (a) this and (b) risks of using TPM."

Multifactor Authentication

Some smart cards can receive information from the reader to confirm that the reader is authentic. This is called ___ authentication.

Mutual

In Windows, files and folders can be encrypted using the Windows _____ (EFS). This encryption works only with the ___ file system and business and professional editions of Windows.

NTFS

For computers that don't have TPM, the startup key can be stored on a USB flash drive (or other storage device the computer reads before the ___ is loaded), and the flash drive must be installed before the computer boots. This method authenticates the ___.

OS User

Normally, Windows authenticates a user with a Windows ___. However, the best authentication happens when a user ___ something (such as a password) and ___ something, which is called a security token (such as a smart card or a fingerprint scan).

Password Knows Possesses

Windows Firewall is a ___ firewall. It is automatically configured when you set up your security level for a new network connection.

Personal

__ is a type of identity theft in which the sender of an email message scams you into responding with personal data about yourself. Even more plausible is ___, where the email appears to come from companies you already do business with.

Phishing Spear phishing

Recall that, for Windows 8, the security level options are ___ and ___ security, and for Windows 7, the options are home, ___, and public security.

Private Public Work

It's important to download software only from trusted publishers and providers. Even software from a trusted ___ can be filled with destructive extras if the software is obtained from an untrusted ___.

Publisher Provider

If an infected computer is connected to a network, immediately disconnect the network cable or turn off the wireless adapter. A ____ computer is not allowed to use the regular network that other computers use.

Quarantined

Another type of contactless token uses wireless technology, for example, an RFID token. RFID stands for _____________.

Radio frequency identification

___ holds your computer system hostage until you pay money. An example is the ___ Trojan program that did damage in 2014.

Ransomware Cryptolocker

In Windows, some malware hides its program files in ___ points stored in the System Volume Information folder maintained by System Protection. If System Protection is on, anti-malware software can't clean this protected folder.

Restore

A ___ loads itself before the OS boot is complete, It can hide in boot managers, boot loader programs or ___ mode device drivers.

Rootkit Kernel

For solid-state devices, use a _____utility, which you can download from the manufacturer of the device.

Secure erase

Be aware of ___ surfing, when other people secretly peek at your monitor screen as you work. A privacy ___ can help.

Shoulder Filter

In the computer arena, _______ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.

Social engineering

A large corporation might use a ___ firewall, also called a corporate firewall, installed on a computer that stands between the Internet and the network to protect the network. This computer has two network cards installed, and the installed firewall filters the traffic between the two cards.

Software

The Guest account is disabled by default and should remain disabled. If you want to set up an account for visitors, create a ___ account and name it Visitor."

Standard

The TPM chip holds the BitLocker encryption key (also called the ___ key).

Startup

When a user signs in to the network, she must enter the number on the key fob, which is ___ with the network authentication service. Because the device doesn't actually make physical contact with the system, it is called a ___ token or ___ token.

Synchronized Contactless Disconnected

To get rid of that malware, turn off _____ but, when you do so, all your restore points are lost.

System protection

The drive lock password does not require a ___ chip and is stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed on another system.

TPM

A form of ____ occurs wen a user steps away from her computer and another person continues to use the Windows session when the system is not properly locked.

Tailgating

A ___ does not need a host program; rather, it substitutes itself for a legitimate program. In most cases, a user launches it thinking she is launching a legitimate program.

Trojan

An encrypted file remains encrypted if you move it from an encrypted folder to an unencrypted folder on the same or another NTFS volume.

True

If a folder is marked for encryption, every file created in the folder or copied to the folder will be encrypted.

True

Many motherboards for desktop and laptop computers offer several ____ security features, including UEFI secure boot, power-on passwords, etc.

UEFI/BIOS

The A+ 220-902 exam expects you to be able to summarize the purposes of services provided by a UTM Internet appliance, including an IDS and IPS. UTM stands for _____________.

Unified threat management

A ___ is a program that replicates by attaching itself to other programs. The infected program must be executed for a virus to run. A ___ is a program that copies itself throughout a network or the Internet without a host program.

Virus Worm

The quickest way to lock down a computer is to press _____. Another method is to press Ctrl+Alt+Delete.

Win+L

Microsoft sometimes releases patches off schedule so that hackers have ___ days to attack customers.

Zero

To wipe a drive clean, you can perform a low-level format of a drive, which overwrites the data with ___. You can download a low-level format utility or ___ utility from many hard drive manufacturers.

Zeroes Zero-fill

A ___ is a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the knowledge of its user.

Zombie

A similar feature, ___, encrypts data on a USB flash drive and restricts access by requiring a password. You need to be aware of the restrictions and possible ___ before you decide to use BitLocker.

bitlocker to go Risks

To start Group Policy, use the ___ command in the Windows 8 Run box or in the Windows 7 Search box.

gpedit.msc

To find out the resulting policies for the computer or user that are currently applied to the system, you can use the ___ command in a command prompt window with parameters.

gpresult

How secure is your password? Go to ___ and find out how long it will take a computer to crack your password.

howsecureismypassword.net

Computers in hotel lobbies or Internet cafes should only be used for web browsing -- not for signing in to your email account or online banking account. These computers might be running ____ software put there by criminals to record each keystroke.

keystroke-logging

Password management software, also called password vault software, such as KeePass (keeepass.info), ___ (lastpass.com), and Dashlane (dashlane.com), can hold your passwords safely so that you don't forget them or have to write them down.

lastpass

The User Accounts utility, also called the ___ Wizard, can be used to change the way Windows sign-in works. The program name and extension of the User Accounts utility is ___

network places netplwiz.exe

Many laptop computers have a chip on the motherboard called the TPM chip. TPM stands for ___.

trusted platform module


संबंधित स्टडी सेट्स

Obchod II. - zápočet JUDr. Čech

View Set

Chapter 38 Oxygenation and Perfusion

View Set

Entrepreneurship: Chapters 7 & 8

View Set

Garcia v. San Antonio Metro. Transit Authority

View Set

Fed Tax II - Chapter 3: The Corporate Income Tax

View Set

Positive and Negative Predictive Values

View Set

11 MKC1 CH-15 Price, the Only Revenue Generator

View Set