What types of Keys use asymmetric encryption?
Private keys and public keys use asymmetric encryption?
What is social engineering?
Social engineering attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords.
What is private browser mode?
When a computer user browses the web in private mode, the following occurs:
Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus.
How would you keep a laptop secure both in a public place and in storage?
Retail solutions have to be flexible for both customers and employees. Physical security products are available to provide a solution such as using cable locks to secure equipment and an electronic lock that records activity on a door.
What type of encoding does MD5 use?
MD5 uses hash encoding to guarantee the integrity of data
What is a DDoS attack?
A DDoS attack attacks with large amounts of data traffic that can restrict access to network services.
Why would you use the idle timeout feature in windows?
The idle timeout and screen lock feature is a great security measure that protects the computer and data accessible through it if the user steps away from the desk for a specified period of time and forgets to lock the computer or log off.
What is a remote access policy?
The remote access policy section of a corporate security policy identifies how remote users can access a network and what is accessible via remote connectivity.
What are the features of what a Torjan attack would do to your equipment?
Trojans can enable unauthorized remote access, provide the attacker with data, corrupt or delete files, use the computer as a source for other attacks, enable unauthorized services, and stop antimalware software.
What type of encoding does SHA use?
MD5 uses hash encoding to guarantee the integrity of data
Why would you check for the latest OS patches and updates after removing a virus?
After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to.
What is a proxy firewall?
Proxy - This is a firewall installed on a proxy server that inspects all traffic and allows or denies packets based on configured rules. A proxy server is a server that is a relay between a client and a destination server on the Internet.
What is a Packet filter firewall?
Packet filter - Packets cannot pass through the firewall, unless they match the established rule set configured in the firewall. Traffic can be filtered based on different attributes, such as source IP address, source port or destination IP address or port.
What is a Stateful packet firewall?
Stateful packet inspection (SPI) - This is a firewall that keeps track of the state of network connections traveling through the firewall. Packets that are not part of a known connection are dropped.
What is a mantrap?
A mantrap is a small room with two doors, one of which must be closed before the other can be opened.
What is EFS?
Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders linked to a specific user account.
What is TPM?
TPM is a specialized chip on the motherboard that stores information specific to the computer system such as encryption keys, digital certificates, and passwords.
What is a Application layer firewall?
Application layer - All packets traveling to or from an application are intercepted. All unwanted outside traffic is prevented from reaching protected devices.
What do you have to enable in the BIOS to make BitLocker work?
A Trusted Platform Module (TPM) is a motherboard chip used to store security information such as encryption keys, security certificates, and passwords. It is required to be enabled before implementing BitLocker.
What is a botnet?
A botnet is a network of infected computers called a zombie network. The computers are controlled by a hacker and are used to attack other computers or to steal data.
What is BitLocker?
BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume.
What is a signature (in terms of security threats)?
Antimalware software analyzes code patterns within malware to create signatures that are stored in virus definition tables. Antimalware signature files are constantly being updated because malware is constantly morphing into new strands.
What is the purpose of an acceptable use policy?
The acceptable use policies section of a security policy commonly identifies network resources and usages that are acceptable to the organization. They might also state the ramifications that can occur if this security policy is violated.
Two things commonly cause a Windows update to fail?
Two things commonly cause a Windows update to fail:
What is a degaussing wand and how does it work?
A degaussing wand requires being placed over hard drive platters for a couple of minutes, whereas an electromagnetic degaussing device can wipe all data in seconds.
What is the purpose of a BIOS password?
A BIOS password is configured to keep people from entering the BIOS without authorization.
What is SmartScreen Filter?
In Internet Explorer, use the Tools option to enable. In Microsoft Edge, use the three dotted icon to select Settings > View advanced settings to turn the Help protect me from malicious sites and downloads with Windows Defender SmartScreen option on.
What do these do in security policies?
Enforce password history:
Maximum password age:
Minimum password length:
Meet complexity requirements:
Tell me what they do!!!!
What would you use Local Users and Groups for in Windows 7?
Within the Local Users and Groups tool, a technician can create users, create groups, and assign rights and permissions.
Why would you use Limit the login times?
The technician can limit the time logins can occur on a computer so no other work can be down on the computer outside of work hours.
What should you change on a wireless router when you first set it up?
The default settings on a wireless network usually include an SSID that is being broadcast as well as default IP address settings. These default settings are considered insecure because with them an attacker can easily see a wireless network and attempt to connect to it and make changes to the network.
And the Admin Username and password.
On Windows 10 what would you use to prevent an program from accessing the public Internet?
Windows Firewall with Advanced Security or the Windows 10 Windows Defender Firewall with Advanced Security is used to create inbound and outbound rules, connection security rules such as security traffic between two computers, and monitoring any active connection security rules.