Chapter 18 Test
List five of the different criteria that make up a secure password?
1. Eight or more characters 2. Use uppercase, lowercase, interchangeably 3. Do not use numbers or letters in order like 1234, or abcd 4. Use symbols 5. Do not use actual words
What is a Trojan, and how is it installed?
A Trojan is a type of malware that does not need a host in order to replicate. This type of malware hides by pretending to be a legitimate program.
After initially installing Windows 7, you need to disable the Guest account so nobody can use it. True or false
False
On a peer-to-peer network, authentication is the responsibility of the domain. True or false
False
What is a rootkit and why is it so difficult to detect?
It is one of the many types of malware that is hard to detect mainly because it loads before antivirus software has a chance to catch it. It can also hijack internal windows components.
What software program is an example of password management software? (Choose all that apply.) LastPass PassLock KeePass Dashlane
LastPass KeePass Dashlane
What does the presence of the Cydia app on an iOS device indicate? A rootkit has been installed on the device There is spyware software installed on the device The device has been jailbroken The device is infected with a worm
The device has been jailbroken
Using Group Policy, you can set security policies to help secure a workstation. True or false
True
Under what circumstances can a blank password be more secure than a non-blank password?
When using a blank password you cannot login remotely. So if you never leave say your house with that computer, then its less likely they can login. That is more secure than having a weak password that you use when you leave your house. Basically if you do not sign in remotely and trust the location of your device then a blank password can be more secure.
Describe Windows Firewall.
Windows Firewall is a software designed to block a local computer from being disrupted from the internet. This can prevent harmful software to infect the system. If another computer on the same network as the computer gets infected and tries to spread and replicate through the same network, then the computer can be protected since it is a local firewall. Also called a host firewall, or personal firewall.
With respect to the default users and password settings, how can you use Group Policy to make your system more secure?
You can set passwords using Group Policy, and who has password and who does not. You can audit failed login ins being able to see the user and the time they logged in at. Also see successful log ins and the user and see the times. You can also use scripts for log ins.
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? a USB port a PIN on the BIOS a TPM chip on the motherboard an authentication key on the hard drive
a TPM chip on the motherboard
When using the Windows Encrypted File System, what statement is accurate? an encrypted file moved to an unencrypted folder remains encrypted EFS only works on NTFS and FAT32 files can be marked for encryption, but not folders you need to download special software to use EFS
an encrypted file moved to an unencrypted folder remains encrypted
What statement regarding passwords on Windows is accurate? passwords cannot be longer than 14 characters by default, accounts with a blank password cannot logon remotely it's best to write your password down so you don't get locked out of your computer letters and numbers are allowed, but no symbols such as '@' or '!'
by default, accounts with a blank password cannot logon remotely
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term? evidence security roster chain of custody evidence tracking list item inventory
chain of custody
What inputs would be considered to be part of a biometric device? (Choose all that apply.) retina voice keystrokes fingerprint
fingerprint retina voice
What command can be used to take full access of a file? perms takeown icacls attrib
icacls
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? rootkit zombie brute-force man-in-the-middle
man-in-the-middle
What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.) press Ctrl+End and click Logon Screen press Ctrl+Alt+Delete and click Lock this Computer press Windows key + L Press F1 and click Sleep
press Ctrl+Alt+Delete and click Lock this Computer press Windows key + L
CryptoLocker is an example of what type of malware? worm man-in-the-middle zero-day attack ransomware
ransomware
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? worm Trojan horse adware rootkit
rootkit
A person that secretly peaks at your monitor screen while you work may be doing what? tailgating shoulder surfing social engineering screen capping
shoulder surfing
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? the BIOS your USB keyboard a feature available on some DVD drives Windows POP technology
the BIOS
A root certificate is the original certificate issued by the CA. True or false
true
What are some of the ways you can use BitLocker Encryption? (Choose all that apply.) user authentication using a certificate computer and user authentication using a PIN and TPM user authentication using a USB flash drive computer authentication using TPM
user authentication using a USB flash drive computer authentication using TPM user authentication using a certificate