Security I
Security II
Security III
Security IV
Security V
Security VI
100

How do you stop unauthorised people from gaining access?

A guard checking IDs or a mantrap can help prevent someone following a legitimate employee into a restricted area. With biometrics, employee smart IDs, or multifactor authentication being used, once the door is accessed by someone having the correct credentials, unauthorized people could still trail the legitimate person into the building or area.

100

What are signs that a computer is infected by a virus?

Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus.

Running Slow...

Pop ups

100

How do you keep a laptop safe?

How do you keep the backroom inventory safe?

Retail solutions have to be flexible for both customers and employees. Physical security products are available to provide a solution such as using cable locks to secure equipment and an electronic lock that records activity on a door.

100

What is TPM

 A Trusted Platform Module (TPM) is a motherboard chip used to store security information such as encryption keys, security certificates, and passwords. It is required to be enabled before implementing BitLocker.

100

What can a Trojan do?

Trojans can enable unauthorized remote access, provide the attacker with data, corrupt or delete files, use the computer as a source for other attacks, enable unauthorized services, and stop antimalware software.

100

What does  Windows Defender Firewall with Advanced Security do?

Windows Firewall with Advanced Security or the Windows 10 Windows Defender Firewall with Advanced Security is used to create inbound and outbound rules, connection security rules such as security traffic between two computers, and monitoring any active connection security rules.

200

What is Social Engineering

Social engineering attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords.  

200

What does a  degaussing wand do?

 A degaussing wand requires being placed over hard drive platters for a couple of minutes, whereas an electromagnetic degaussing device can wipe all data in seconds.

200

What does private browser mode do for you?

When a computer user browses the web in private mode, the following occurs:Cookies are disabled. Temporary Internet files are removed after closing the window. Browsing history is removed after closing the window.

200

After you remove a virus, what is the next step?

 After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process.

200

What does antimalware protect you against?

Rootkits, Trojans, Virus, spyware, worms, ransomware, keyloggers & adware.

200

When should you disable Windows Firewall?

Only disable Windows Firewall if other firewall software is installed. Use the Windows Firewall (Windows 7 or 8) or the Windows Defender Firewall (Windows 10) Control Panel to enable or disable the Windows Firewall.

300

What type of security policy would and organization  have that allows employees to connect to the office intranet from their homes?

The remote access policy section of a corporate security policy identifies how remote users can access a network and what is accessible via remote connectivity.

300

What does "meet complexity requirements" do in the local security policy?

The Password must meet complexity requirements option requires that the user not make their own user account name or part of their user account name as their password. This option also requires that the password have at least three of the following: uppercase letter, lowercase letter, number, and symbol.

300

What is a DDoS

A DDoS attacks generate large amounts of data traffic that can restrict access to network services. 

300

How do you make Wireless networks more secure?

The default settings on a wireless network usually include an SSID that is being broadcast as well as default IP address settings. These default settings are considered insecure because with them an attacker can easily see a wireless network and attempt to connect to it and make changes to the network.

300

Why should you have the Idle Timeout and sCreen lock enabled?

 The idle timeout and screen lock feature is a great security measure that protects the computer and data accessible through it if the user steps away from the desk for a specified period of time and forgets to lock the computer or log off.

300

What is EFS

Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders linked to a specific user account.

400

How can you stop employees from logging after hours?

Limit the login times

400

What does a proxy firewall do?

This is a firewall installed on a proxy server that inspects all traffic and allows or denies packets based on configured rules. A proxy server is a server that is a relay between a client and a destination server on the Internet.

400

What would cause a Microsoft Windows update to fail?

 Two things commonly cause a Windows update to fail: 1. A required older update was not installed. 

2. There was a problem with the downloaded update.

400

What are signatures as they relate to security threats?

Antimalware software analyzes code patterns within malware to create signatures that are stored in virus definition tables. Antimalware signature files are constantly being updated because malware is constantly morphing into new strands.

400

What is an acceptable use policy?

 The acceptable use policies section of a security policy commonly identifies network resources and usages that are acceptable to the organization. They might also state the ramifications that can occur if this security policy is violated.

400

What is a botnet

A botnet is a network of infected computers called a zombie network. The computers are controlled by a hacker and are used to attack other computers or to steal data.

500

If a password box pops up when a computer first turns on, what type of password would that be?

A BIOS password is configured by entering the BIOS Setup program.

500

What algorithms are used for hash encoding to guarantee the integrity of data?

SHA

MD5

500

What is SmartScreen Filter?

It detects and filters phishing websites, to analyze websites for suspicious items.

In Internet Explorer, use the Tools option to enable. In Microsoft Edge, use the three dotted icon to select Settings > View advanced settings to turn the Help protect me from malicious sites and downloads with Windows Defender SmartScreen option on.

500

How does Asymmetric encryption work?

Asymmetric encryption uses a private key associated with a public key.

500

Where do you go in Windows 7 to configure rights and permissions?

 Within the Local Users and Groups tool, a technician can create users, create groups, and assign rights and permissions.

M
e
n
u