• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/32

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

32 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

War _______ is the process of using a set of symbols and shorthand to mark buildings, curbs, and other landmarks to indicate the presence of an available access point and its connection details.

Chalking

You are troubleshooting an infected computer. You need to delete several infected files. However, when you try to delete the files, the system says that the files are in use. How should you go about deleting the files?

Boot into Safe Mode with the command prompt, and delete the files.

What security feature prompts you to click Continue or enter administrative credentials to preform some administrative tasks?

UAC

Which of the following is NOT a component of the Windows Security Center?


Windows Firewall


Automatic updates


Users and Groups


Malware protection

Users and Groups

how does a BIOS password help secure a computer

It prevents the change of any CMOS settings.

What security attack makes a malicious program appear to be one that is benign?

Trojan horse

_______ is a term used to describe any type of destructive software, such as viruses and worms?

Malware

A user that works for a scientific research company receives and e-mail about low mortgage rates from an unknown organization. What is this an example of?

Spam

A _________ when activated stays in contact with a monitoring center, enabling you to send the commands to lock a mobile device and delete data via the center if the device is stolen.

LoJack

Which of the following are case-sensitive in Windows?


Usernames


Computer names


Passwords


Filenames

Passwords

Which part of an antivirus suite is used to identify viruses on the computer?

Definition file

What are some good practices to implement when secruing a work station? (Select three)


Set a strong pass


Sanitize the hard drive


Set NTFS permissions


Enable Autorun


Connect to a WEP-encrypted wireless network


Configure the BIOS boot sequence.

Strong Pass


Set NTFS perms


Configure the BIOS boot sequence.

Which programs scans system files for problematic and can also replace problematic system files?

sfc

Which of the following is the best option for wireless security?


WEP


SSID


WPA2


MAC filtering

WPA2

You are tasked to fix a laptop. You find out that the computer has a virus. What should you do first?

Identify the malware

Which one of the follwoing is a good sign that a computer has been infected by a worm?


The computer is sending out unauthorized e-mails.


The left and right mouce buttions have been reversed


The desctop background changed all on its own


The screen saver changed all on its own.

The computer is sending out unauthorized e-mails.

BitLocker is an example of what type of technology?

Drive encryption

For the third time this month , you have had to re-image a computer for the same end user. After analyzing the situation, you have determined that the root cause is due to the user opening unknown attachments. What is most likely the issue at hand.

Virus

Which encryption method uses the Advanced Encryption System (AES) cipher?

WPA2

What is the Windows 7 build-in spyware protection function called?

Windows Defender

Which user group is the most restricted?

Guests

Into which of the following categories of security weaknesses does an inadvertent open port on the firewall fall into?


Techonology weaknesses


Configuration weaknesses


Policy weaknesses


Malice

Configuration weaknesses

Which social engineering attack yields useful items such as Internal phone directories, organizational charts, policy manuals, calendars, outdated hardware, system manuals, network diagrams, ad other technical information sources?

Dumpster diveing

A user in a home is configuring a wireless network. He wants to prevent he neighbor from accessing the wireless network. What should he do? (Select two)


Create a DMZ


Dissable SSID


Enable DHCP


Turn off all PCs when thay are not in use.


Enable wireless encryption.

Disable SSID


Enable wireless encryption.

What function does the RADIUS server play?

Authentication

Which one of the following is built-in security feature of Windows 7/Vista?

UAC

User Account Control

An unauthorized user follows an authorized user into a building without swiping an ID card to gain access. What is this known as?

Tailgating

Your boss wants to use BitLocker but his laptop does not have a TPM chip on the motherboard. What is your solution?

Use a USB key

Which of the following gathers information used to target advertising?


Viruses


Worms


Trojan horses


Spyware

Spyware

One of your customers has a computer with a virus sacanner that scanes all files currently in use. Why should you preform a full scan peirodically?

Files that have not been accessed recently may conatain a virus.

Which of the following security concepts descrives securing ports and protocols in a system?


Data classification


Software firewall


Social engineering


Disk encryption

Software firewall

A Caller convinces a user to reveal his password by impersonation the IT staff. What sort of attack is this?

Social engineering.