Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
32 Cards in this Set
- Front
- Back
- 3rd side (hint)
War _______ is the process of using a set of symbols and shorthand to mark buildings, curbs, and other landmarks to indicate the presence of an available access point and its connection details. |
Chalking |
|
|
You are troubleshooting an infected computer. You need to delete several infected files. However, when you try to delete the files, the system says that the files are in use. How should you go about deleting the files? |
Boot into Safe Mode with the command prompt, and delete the files. |
|
|
What security feature prompts you to click Continue or enter administrative credentials to preform some administrative tasks? |
UAC |
|
|
Which of the following is NOT a component of the Windows Security Center? Windows Firewall Automatic updates Users and Groups Malware protection |
Users and Groups |
|
|
how does a BIOS password help secure a computer |
It prevents the change of any CMOS settings. |
|
|
What security attack makes a malicious program appear to be one that is benign? |
Trojan horse |
|
|
_______ is a term used to describe any type of destructive software, such as viruses and worms? |
Malware |
|
|
A user that works for a scientific research company receives and e-mail about low mortgage rates from an unknown organization. What is this an example of? |
Spam |
|
|
A _________ when activated stays in contact with a monitoring center, enabling you to send the commands to lock a mobile device and delete data via the center if the device is stolen. |
LoJack |
|
|
Which of the following are case-sensitive in Windows? Usernames Computer names Passwords Filenames |
Passwords |
|
|
Which part of an antivirus suite is used to identify viruses on the computer? |
Definition file |
|
|
What are some good practices to implement when secruing a work station? (Select three) Set a strong pass Sanitize the hard drive Set NTFS permissions Enable Autorun Connect to a WEP-encrypted wireless network Configure the BIOS boot sequence. |
Strong Pass Set NTFS perms Configure the BIOS boot sequence. |
|
|
Which programs scans system files for problematic and can also replace problematic system files? |
sfc |
|
|
Which of the following is the best option for wireless security? WEP SSID WPA2 MAC filtering |
WPA2 |
|
|
You are tasked to fix a laptop. You find out that the computer has a virus. What should you do first? |
Identify the malware |
|
|
Which one of the follwoing is a good sign that a computer has been infected by a worm? The computer is sending out unauthorized e-mails. The left and right mouce buttions have been reversed The desctop background changed all on its own The screen saver changed all on its own. |
The computer is sending out unauthorized e-mails. |
|
|
BitLocker is an example of what type of technology? |
Drive encryption |
|
|
For the third time this month , you have had to re-image a computer for the same end user. After analyzing the situation, you have determined that the root cause is due to the user opening unknown attachments. What is most likely the issue at hand. |
Virus |
|
|
Which encryption method uses the Advanced Encryption System (AES) cipher? |
WPA2 |
|
|
What is the Windows 7 build-in spyware protection function called? |
Windows Defender |
|
|
Which user group is the most restricted? |
Guests |
|
|
Into which of the following categories of security weaknesses does an inadvertent open port on the firewall fall into? Techonology weaknesses Configuration weaknesses Policy weaknesses Malice |
Configuration weaknesses |
|
|
Which social engineering attack yields useful items such as Internal phone directories, organizational charts, policy manuals, calendars, outdated hardware, system manuals, network diagrams, ad other technical information sources? |
Dumpster diveing |
|
|
A user in a home is configuring a wireless network. He wants to prevent he neighbor from accessing the wireless network. What should he do? (Select two) Create a DMZ Dissable SSID Enable DHCP Turn off all PCs when thay are not in use. Enable wireless encryption. |
Disable SSID Enable wireless encryption. |
|
|
What function does the RADIUS server play? |
Authentication |
|
|
Which one of the following is built-in security feature of Windows 7/Vista? |
UAC |
User Account Control |
|
An unauthorized user follows an authorized user into a building without swiping an ID card to gain access. What is this known as? |
Tailgating |
|
|
Your boss wants to use BitLocker but his laptop does not have a TPM chip on the motherboard. What is your solution? |
Use a USB key |
|
|
Which of the following gathers information used to target advertising? Viruses Worms Trojan horses Spyware |
Spyware |
|
|
One of your customers has a computer with a virus sacanner that scanes all files currently in use. Why should you preform a full scan peirodically? |
Files that have not been accessed recently may conatain a virus. |
|
|
Which of the following security concepts descrives securing ports and protocols in a system? Data classification Software firewall Social engineering Disk encryption |
Software firewall |
|
|
A Caller convinces a user to reveal his password by impersonation the IT staff. What sort of attack is this? |
Social engineering. |
|