CTI - 120 SEC CHAPTER 5
What technology is used by Windows to prevent unauthorized changes to your system?
UAC
SMTP uses TCP port:
25
When using Internet Explorer, how many content zones are there?
4
Windows Firewall
A software component included with Windows that can help prevent hackers or malicious software from gaining access to your computer through network or the internet
windows store
Access to purchase and download apps that use the Windows 8 interface.
encrypt the offline files
Add the address or domain for these emails to the white list
Symptoms of malware are: (Select the best answer)
All of the above
Microsoft account
Allows a user to access resources on a computer and on Microsoft cloud computing services.
_________________ are copies of network files that are stored on your computer so that a user can access them when they are not connected to the network.
Offline Files
Which of the following is used to stop a program from running on a Windows 10 system?
AppLocker
zero day attack
Attack that exploits previously unknown vulnerabilities, so victims have no time (zero days) to prepare for or defend against the attack.
For a more secure environment, all users should be administrators of their computer and not a standard user.
False
If you want to use a local AppLocker rule on all computers in your business, you have to recreate the the rule on every computer. You cannot export the local policy and import to a GPO.
False
Which of the following is a free tool that allows administrators to quickly configure and manage desktops and users using Group Policy?
Security Compliance Manager
SCM 4.0
Security Compliance Manager is a free tool from microsoft that can be used to quickly configure and manage your desktops, traditional data center and private cloud using Group Policy and System Center Configuration Manager
_____________ is an email validation system that is designed to verify if an email is coming from the proper email server.
Sender Policy Framework
LOB App
Line of business app programs and software that are essential to running a business
_______________ is software that is designed to infiltrate or infect a computer, usually with ill intent.
Malware
Which type of account is used with outlook.com and OneDrive and can be used to synchronize a desktop across multiple computers?
Microsoft Account
MBSA
Microsoft Baseline security analyzer a software tool released by MS to determine the security state of a system by assessing missing security updates and less secure security settings within MS windows components
MAPS
Microsoft active protection service the network of windows defender and Microsoft security essentials users that help determine which programs are classified as spyware
A(n) ____________________ is a full replication of the domain database and is located in places where a domain controller is needed but where physical security of the domain controller cannot be guaranteed.
RODC (Read-only Domain Controller)
When a user is notified of an attempt by programs to make changes to their computer, the desktop will be dimmed. This dimming indicates the computer is in ___________________ mode, because other programs can't run until the changes are approved or disapproved.
Secure Desktop
Which of the following is a collection of security settings that can be used to configure client settings?
Security Baseline
Windows Defender can scan a computer on a regular basis and remove or quarantine malware.
True
SPF
Sender Policy Framework an email validation system designed to prevent emails spam that uses source address spoofing. SPF allows administrators to specific in DNS SPF records in the public DNS which hosts are allowed to send email from given domain
_____________ is another name for junk email
Spam
Which type of malware collects personal information or browsing history, often without the user's knowledge?
Spyware
When attempting to change the computer's display settings, which of the following causes a pop-up asking that prompts if a user wants to continue?
UAC
For antivirus software to be effective, it must be kept ___________.
Updated
UAC
User account control a feature that started with Windows Vista and is included with Windows 7. UAC helps prevent unauthorized changes to your computer in doing so it helps protect your system from malware
Which type of malware reproduces itself on a computer without the owner's consent and will often delete or corrupt files?
Virus
An example of a(n) ____________ is a message that states you should delete the win.com file, because it is a virus.
Virus Hoax
backdoor
a conveniences sometimes installed by designers so that they can easily make changes but it can be taken advantage of as the attacker uses it to circumvent security protocols
virus hoax
a message warning the recipient of a nonexistent computer virus threat, usually sent as a chain email that tells the recipient to forward it to everyone he or she knows
What malware gives administrator-level control over a computer system without being detected?
rootkit
Microsoft's built-in antivirus and antispyware program is _____________.
Windows Defender
Which host-based firewall software comes with today's version of Windows?
Windows Firewall
Which program can be used to configure IPsec on a computer running Windows Server 2016?
Windows Firewall with Advanced Security
To control which updates get pushed to clients within an organization, an administrator would use [__] or [____].
Windows Server Update Service System Center Configuration Manager
windows store for business
Windows Store for Business provides a distribution of line-of-business applications to be deployed in an organization. It enables the owner to manage and maintain these custom apps in the same way as you do commercially available apps.
The Windows feature to keep the Windows operating system up to date with patches to security issues is called ______________.
Windows Update
A(n) ________ is a computer program that uses a network to self-replicate.
Worm
Which of the following is most likely the problem when a computer seems to be slow and a different default web page displays?
Your computer has been infected with malware.
Microsoft Edge
a browser made by Microsoft for windows
security template
a collection of configuration settings stored as a text file with and .inf extension
rule collection
a collection of rules used in windows defender
security baseline
a collection of security configuration settings that are to be applied to a particular host in the enterprise
pop up window
a component used on web pages that can be used as part of a useful website controls, but can also be used for annoying advertisements and few may attempt to load spyware or other malicious programs
cookie
a piece of text stored by a users web browser. this file can be used for a wide range of purposes - user identification - authentication - storing site preferences - shopping cart contents
virus
a program that can copy itself and infect a computer without the users consent or knowledge
worm
a self replicating program that copies itself to other computer on a network without any user interventio
rootkit
a software or hardware device designed to gain administrator level control over a computer system without being detected
windows defender
a software product from Microsoft that is intended to prevent, remove, and quarantine spyware in Microsoft Windows
Bayesian filtering
a special algorithm that uses key words to determine whether an email is considered as spam
phishing
a technique base on social engineering where users are asked to supply personal information
spywayre
a type of malware that is installed on a computer to collect a uses personal information or details about his or her browsing habits, often without the users knowledge
polymorphic virus
an armored virus that can changes upon execution to many different forms
pharming
an attack aimed at redirecting a websites traffic to a bogus website
trojan horse
an executable program that appears as a desirable or useful program. As it appears to be desirable or useful use are tricked into loading and executing the program on their system
What technique is used to send you to a fake, but realistic-looking, website to verify your account information?
phishing
Which of the following refers to a social engineering technique in which a user receives an email stating that his account has just expired and he should log on to a legitimate-looking website to fix the problem?
phishing
A ______ allows someone access by circumventing normal security precautions for the application. This gives a remote user unauthorized control of a system or automatically initiates an unauthorized task. This could be created by malware or could be created by developers.
backdoor
BYOD
bring your own device
Viruses and worms often exploit _________________. This can occur when more data is sent than the buffer can hold.
buffer overflows
This fast growing form of malware, encrypts data files and then requests payment from the user to decrypt the files. This type of malware is called ______________.
ransomware
applocker
controls how users access and use programs and files and extend the functionality originally provided by the software restriction policy found in earlier versions of Windows. In Windows 10, AppLocker is located in the Local Group Policy Editor
offline files
copies of network files that are stored on your computer so you can access them when you arent connected to the network
RODC
read only domain controller allows a read only copy of the AD to be stored
SSL is a cryptographic system that uses two keys to encrypt data. The public key is stored in a(n) ____________.
digital certificate
Which of the following tasks is recommended if sensitive or confidential information stored in offline files?
encrypt the offline files
To protect sensitive and confidential information in offline files they should be _____________.
encrypted
windows update
fixes, patches and service packs and update device drivers that should be applied to a windows system. by adding fixes and patches windows will be kept stable and secure
spam
junk email that is usually sent unsolicited
Which of the following is the best thing to do to protect a computer against malware, besides installing an antivirus software package? (Choose the best answer)
keep your machine up to date with the latest security patches
A(n) ______________ attack redirects a website's traffic to a bogus website.
pharming
A(n) _______ is a collection of security settings stored in a text file that can be used to save security configurations, deploy the security settings to a computer or group policy or to analyze compliance of a computer to the desired configuration.
security template
Which of the following refers to a thoroughly tested, cumulative set of hotfixes and other patches?
service pack
ransomware
software that encrypts a computer so that it cannot be used and to be unlocked a price must be paid
malicious software malware
software that is designed to infiltrate's or affect a computer system without the owner's informed consent. The term malware is usually associate with viruses, worms, trojan horses, spyware, rootkits and dishonest adware
UWP
universal windows platform app the Microsoft app
windows server update
wsus a software system that can keep you systems updated with the newest windows and office updates
Attacks based on unknown or recently announced vulnerabilities are _____________. The attack occurs before the developer knows about or has a chance to fix the vulnerability.
zero-day
content zone
zones used to define and help manage security when visiting sites