Security Part II

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

If a notebook user is having difficulty logging in with her correct password(not caps lock) what is likely the issue?

The Num Lock key is on causing numbers to be sent from the keyboard instead of letters.

What is Single Sign-on?

The information is applied directly (enabling the end user not responsible for remembering their passwords.

What is one main benefit of Domain Verification?

The user accounts are stored in one central location.

What is a Seed on a Key Fob?

This is the factory set random keys that will match with the computers.

On Remote Desktop how do you specify where the credentials you are using to log in reside?

workstation name\credentials

What is the process of Remediation?

Its the process of correcting any problems that are found so the computer is restored to its original state.

What is a Key Fob security token?

A key-ring like object that generates an authentication code which when used in conjunction with the users PIN allows access.

What is the difference between a password and pass phrase?

A pass phrase is a longer version of a password that might contain multiple words.

What is a Security Token?

A physical device that an authorized user of the system is given that allows for authentication-

What is a Password Policy?

A policy defines characteristics that valid passwords must have. Such as length, complexity, age and history

What is a Worm?

A self-replicating program which does note require a host to propagate.

What is a Boot Sector Virus?

A virus that writes itself into the master boot record or the volume boot record where it loads automatically with the OS.

What is your best defense again these?

Anti-Virus software.

What is a strong password?

At least 8 characters, not in dictionary, requires numbers and symbols, and requires periodic changes.

What is the difference between authentication & authorization?

Authentication is the user identifying themselves to the network. Authorization is determining what users can do what with resources

What is Multi-Factor Authentication?

Authentication requiring the end user to provide more than one form of verification to prove their identification.

What are some ways to remove stubborn malicious files?

Beyond typical antivirus, you may be able to boot into Safe Mode or by booting into the Recovery Console

What are the characteristics of a Trojan Horse

Can not replicate itself, relies on user decisions and actions to spread and is often hidden in useful software.

What are the characteristics of a Worm?

Does not need a host file to propagate, infects one system then others on the network and replicates automatically.

What are some malware symptoms?

Home pay has changed, Pop-uwps, Firewall Alerts, System Errors and changed file extension associations. New icons/toolbars, system cant boot, deleted or renamed files and firewall or antivirus turned off.

What are the steps of installing anti-malware?

Install, update definitions, update engine, full system scan and schedule scans going forward

What are the characteristics of Spyware?

Installed by visiting a site or running an application, collects personal information, uses tracking cookies and can interfere with control.

What are the two ways a user can Authenticate on Win OS?

Locally- the local computer accounts Domain-The accounts are stored on domain controller on AD

What is Malware?

Malicious code intended to take control or damage a user's computer without the users knowledge.

What is a Trojan Horse?

Malicious code that represents itself as legitimate program. Rely on end user decisions to activate and replicate.

Can you Remote Desktop into a profile that doesn't have a password associated with it?

No

Is a user name and password multi-factor authentication?

No, these are both things in something that the user knows category.

What is host based anti-malware?

Placing anti-malware on a sever instead of the individual computer which then protects systems (minus things brought in from that system)

What is the appropriate course of action if you discover a worm on a computer on your network to stop its spread.

Quarantine the computer by putting it on an isolated network.

What is an RFID badge?

Radio Frequency Identification Badge, works similar to Key fob, however the device transmits the information directly.

What is a good course of action if you suspect a hoax email?

Research it on internet, dont open it, do not click on any links in it until you can verify its source and validity

How do you remove a Boot Sector Virus?

Run Fixmbr and Fixboot or use a third-party repair tool.

On a Win 7 machine where can you check if the system can recognize and use installed antivirus software?

Security Center

What is the Account Lockout Policy?

Settings to protect user accounts from being guessed and to also prevent accounts from being used when hacking attempts are detected.

What are more subtle signs of malware?

Slow internet, excessive network traffic, high system resource use, high volume of outgoing mail and unknown programs running.

What is Spyware?

Software that is installed w/o their consent or knowledge, designed to intercept or take partial control of the user's interaction with the computer.

What is Grayware?

Software that might offer a useful purpose, but may also include harmful or malicious code.

What are the 3 general verification categories?

Something the user knows(password or PIN), has (card or Key), or is (fingerprint or retina scan).

What is the Delete action against malware?

To full delete the file

What is the Quarantine action against malware?

To move the file to a safe location (quarantine folder)

What is the Repair action against malware?

To repair a file removing the malicious code and restoring it to its original state.

What are the characteristics of Grayware?

Typically installed with user's permission, but unknown-Adware, spyware or joke programs; or a dail-er program that redirects to dial long distance

What are the characteristics of Adware?

Typically passive privacy invasive software. Obtained by visiting particular site or running app-typically more annoying than harmful

What is Spam?

Unwanted or unsolicited email. Typiocally emails trying to sell products or run with phishing programs or malware attachments. wastes bandwidth

What are common authentication methods?

Username and Password. Smartcard. Biometrics.

What are the characteristics of a Virus?

Viruses require a replication mechanism that the file uses as a host, have a programmed objective.

What are the different types of Malware?

Viruses, Worms, Trojan Horse, Rootkit, Spyware, Adware, Grayware, Spam

What is Single Sign On?

Where a user only needs to sign into one profile that allows them to access resources.

Can Anti-Virus software scan email and block attachments before delivery?

Yes

What is a Virus?

a program that attempts to damage a computer system and replicate itself to other computer systems.

What is a Rootkit?

a stealthy type of malware, that once infected often conceals itself and may require re-installing the OS.

What is Adware?

monitors actions that denote personal preferences, then sends pop-ups and ads that match those preferences.


संबंधित स्टडी सेट्स

power point lesson 4, 5, 6 and 7

View Set

INTB 3355 Exam 2 Clicker questions

View Set

Personal Finance - Chapter 3 Review

View Set