Chapter 27 Quiz (ITN107) - Securing Computers

studied byStudied by 22 people
5.0(1)
Get a hint
Hint

What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?

1 / 23

flashcard set

Earn XP

Description and Tags

24 Terms

1

What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?

Phishing

New cards
2

How does a computer determine who can or should access it, and once accessed, what that user can do?

Authentication

New cards
3

Together, what are viruses, Trojans, and worms called?

Malware

New cards
4

What activity involves simply observing someone's screen or keyboard to get information, often passwords?

Shoulder surfing

New cards
5

A hacker who goes through the garbage looking for information is engaging in ________.

Dumpster diving

New cards
6

What type of virus attempts to change its signature to prevent detection by antivirus programs?

Polymorph

New cards
7

Both wired and wireless networks can use ________ or port security to enable you to blacklist or whitelist devices.

MAC filtering

New cards
8

Microsoft's encryption method of choice for a WAN is ________.

IPsec

New cards
9

What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?

Trojan

New cards
10

What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?

Social engineering

New cards
11

What term describes the process of cleaning up after a virus infection?

Remediation

New cards
12

An intrusion prevention system will ________.

prevent intrusion and also stop attacks as they are occurring

New cards
13

What is a piece of malicious code that gets passed from computer to computer by attaching itself to a program?

Virus

New cards
14

What can be used to create entries in the Security Log whenever a user logs on?

Event auditing

New cards
15

Which current authentication method is typically used over a LAN?

Kerberos

New cards
16

Sally is a member of multiple groups. A file has been granted different permissions to these different groups. What is Sally's effective permission?

Combined permissions of all groups

New cards
17

Physical security, authentication, users and groups, and security policies are all aspects of ________.

Access control

New cards
18

To lock down security settings on an individual system on a network, what would you use?

Local Security Policy

New cards
19

Most computer attacks are accomplished through what type of attack?

Social engineering

New cards
20

A user has a credit card–sized card used to prove her identity with a PIN. What is this card called?

Smart card

New cards
21

What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?

Worm

New cards
22

A hardware firewall ________.

inspects incoming packets individually

New cards
23

Most Web sites today use ________ to encrypt connections.

TLS (Transport Layer Security)

New cards
24

Port forwarding enables you to open a port in a firewall and direct incoming traffic on that port to a(n) ________.

specific IP address on your LAN

New cards

Explore top notes

note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 1 person
... ago
5.0(1)
note Note
studied byStudied by 5 people
... ago
5.0(2)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(2)
note Note
studied byStudied by 16 people
... ago
5.0(1)
note Note
studied byStudied by 38678 people
... ago
4.8(311)

Explore top flashcards

flashcards Flashcard (211)
studied byStudied by 3 people
... ago
4.0(1)
flashcards Flashcard (80)
studied byStudied by 22 people
... ago
5.0(2)
flashcards Flashcard (33)
studied byStudied by 76 people
... ago
5.0(2)
flashcards Flashcard (52)
studied byStudied by 7 people
... ago
5.0(2)
flashcards Flashcard (144)
studied byStudied by 30 people
... ago
5.0(2)
flashcards Flashcard (109)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (43)
studied byStudied by 4 people
... ago
5.0(1)
robot