Security
More Security
Still More Security
Even More Security
Security x 10 +1
100

What types of Keys use asymmetric encryption?


Private keys and public keys use asymmetric encryption?

100

What is social engineering?


Social engineering attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords.

100

What is private browser mode?


When a computer user browses the web in private mode, the following occurs:

  • Cookies are disabled.
  • Temporary Internet files are removed after closing the window.
  • Browsing history is removed after closing the window.
100
What are some ways a virus messes with your system?

Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus.

100

How would you keep a laptop secure both in a public place and in storage?

Retail solutions have to be flexible for both customers and employees. Physical security products are available to provide a solution such as using cable locks to secure equipment and an electronic lock that records activity on a door.


200

What type of encoding does MD5 use?

MD5 uses hash encoding to guarantee the integrity of data

200

What is a DDoS attack?


A DDoS attack attacks with large amounts of data traffic that can restrict access to network services.

200

Why would you use the idle timeout feature in windows?


The idle timeout and screen lock feature is a great security measure that protects the computer and data accessible through it if the user steps away from the desk for a specified period of time and forgets to lock the computer or log off.


200

What is a remote access policy?


The remote access policy section of a corporate security policy identifies how remote users can access a network and what is accessible via remote connectivity.


200

What are the features of what a Torjan attack would do to your equipment?

Trojans can enable unauthorized remote access, provide the attacker with data, corrupt or delete files, use the computer as a source for other attacks, enable unauthorized services, and stop antimalware software.


300

What type of encoding does SHA use?


MD5 uses hash encoding to guarantee the integrity of data

300

Why would you check for the latest OS patches and updates after removing a virus?


After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to.

300

What is a proxy firewall?

Proxy - This is a firewall installed on a proxy server that inspects all traffic and allows or denies packets based on configured rules. A proxy server is a server that is a relay between a client and a destination server on the Internet.


300

What is a Packet filter firewall?

Packet filter - Packets cannot pass through the firewall, unless they match the established rule set configured in the firewall. Traffic can be filtered based on different attributes, such as source IP address, source port or destination IP address or port.

300

What is a Stateful packet firewall?

Stateful packet inspection (SPI) - This is a firewall that keeps track of the state of network connections traveling through the firewall. Packets that are not part of a known connection are dropped.


400

What is a mantrap?

 A mantrap is a small room with two doors, one of which must be closed before the other can be opened.

400

What is EFS?

Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders linked to a specific user account.

400

What is TPM?

 TPM is a specialized chip on the motherboard that stores information specific to the computer system such as encryption keys, digital certificates, and passwords.

400

What is a Application layer firewall?

Application layer - All packets traveling to or from an application are intercepted. All unwanted outside traffic is prevented from reaching protected devices.


400

What do you have to enable in the BIOS to make BitLocker work?

A Trusted Platform Module (TPM) is a motherboard chip used to store security information such as encryption keys, security certificates, and passwords. It is required to be enabled before implementing BitLocker.


500

What is a botnet?


A botnet is a network of infected computers called a zombie network. The computers are controlled by a hacker and are used to attack other computers or to steal data.

500

What is BitLocker?


BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume.

500

What is a signature (in terms of security threats)?

Antimalware software analyzes code patterns within malware to create signatures that are stored in virus definition tables. Antimalware signature files are constantly being updated because malware is constantly morphing into new strands.

500

What is the purpose of an acceptable use policy?


The acceptable use policies section of a security policy commonly identifies network resources and usages that are acceptable to the organization. They might also state the ramifications that can occur if this security policy is violated.


500

Two things commonly cause a Windows update to fail?


Two things commonly cause a Windows update to fail:

  1. A required older update was not installed.
  2. There was a problem with the downloaded update.
600

What is a degaussing wand and how does it work?

A degaussing wand requires being placed over hard drive platters for a couple of minutes, whereas an electromagnetic degaussing device can wipe all data in seconds.


600

What is the purpose of a BIOS password?


A BIOS password is configured to keep people from  entering the BIOS  without authorization.


600

What is SmartScreen Filter?

In Internet Explorer, use the Tools option to enable. In Microsoft Edge, use the three dotted icon to select Settings > View advanced settings to turn the Help protect me from malicious sites and downloads with Windows Defender SmartScreen option on.


600

What do these do in security policies?

Enforce password history:

Maximum password age:

Minimum password length:

Meet complexity requirements:


Tell me what they do!!!!

600

What would you use Local Users and Groups for in Windows 7?


Within the Local Users and Groups tool, a technician can create users, create groups, and assign rights and permissions.


700

Why would you use Limit the login times?

The technician can limit the time logins can occur on a computer so no other work can be down on the computer outside of work hours.


700

What should you change on a wireless router when you first set it up?


The default settings on a wireless network usually include an SSID that is being broadcast as well as default IP address settings. These default settings are considered insecure because with them an attacker can easily see a wireless network and attempt to connect to it and make changes to the network. 

And the Admin Username and password.

700

On Windows 10 what would you use to prevent an program from accessing the public Internet?

Windows Firewall with Advanced Security or the Windows 10 Windows Defender Firewall with Advanced Security is used to create inbound and outbound rules, connection security rules such as security traffic between two computers, and monitoring any active connection security rules.