Configure Workstation Security Part 1
Configure Workstation Security Part 2
Configure Browser Security
Troubleshoot Workstation Security Issues Part 1
Troubleshoot Workstation Security Issues Part 2
100

Two best practices for creating passwords.

What are sufficiently long passwords (12+) and to use memorable phrases without any personal info?

100

The purpose of the real time protection button.

What is disabling the host firewall temporarily?

100

Examples of a trusted source for downloads.

What are app stores or extension stores?

100

A type of malware that hijacks the user's resources, namely GPU, to perform a rogue operation (namely mining cryptocurrency).

What is a cryptominer?

100

One of the first steps to removing malware on a computer to stop the spread.

What is a quarantine?

200

End user best practices for security.

What are logging off when away from the computer, preventing physical theft, and securing personally identifiable information (PII) and passwords?

200

The purpose of the Encrypting File System (EFS)? Not available on Windows Home.

What is encrypting specific files and folders so that they are password protected?

200

A browser add on that adds or changes features of that browser through an application programming interface (API), like adding an extra toolbar.

What is an extension?

200

The type of malware that uses a computers scripting environment to create malicious processes in the memory.

What is fileless malware?

200

After quarantining infected systems, you should ____ to prevent reinfection.

What is disable system restore?

300

What are two account management steps you could take to secure your account?

What are changing the default admin password and disabling the guest account?

300

Windows' Full Disk Encryption product that encrypts an entire drive rather than a single file or folder. Not available on Windows Home.

What is Windows Bitlocker?

300
A feature of all major browsers used to remember and autofill user credentials.

What is a password manager?

300

A common security issue symptom in a browser.

What is a certificate warning?

300

The most effective tool for removing malware is ____.

What is antivirus (or antimalware)?

400

Four best practice account policies.

What are restricting login times, failed attempts lockouts, concurrent logins, and using timeouts/screen locks?

400

True or False. Users can see folders in file explorer that have been encrypted.

What is True?

400

The lock icon next to a browser's URL field indicates that a website has a valid ____.

What is digital certificate?

400

Symptoms of malware that are unlikely to be caused by other system issues.

What are missing or renamed files, new executables with similar names to existing ones, system/personal files with different dates/sizes than known good versions, and files with changed permission attributes that cause "Access Denied" errors?

400

Some tools and techniques you may need to use for manual malware removal.

What are the task manager, the command line, msconfig, and even manual disk removal?

500

A set of commands to run when the flash drive is plugged in to a computer.

What is autorun.inf on a flash drive?

500

Logical security technologies designed to prevent malware from running on a host regardless of the permissions available - Ex: User Account Control (UAC).

What is execution control?

500

This validates the identity of a web server.

What is a certificate authority (CA)?

500

A more common name for a Remote Access Trojan (RAT).

What is a backdoor?

500

An automated task that can help prevent malware infections.

What are antivirus scans?