What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?
Phishing
How does a computer determine who can or should access it, and once accessed, what that user can do?
Authentication
Together, what are viruses, Trojans, and worms called?
Malware
What activity involves simply observing someone's screen or keyboard to get information, often passwords?
Shoulder surfing
A hacker who goes through the garbage looking for information is engaging in ________.
Dumpster diving
What type of virus attempts to change its signature to prevent detection by antivirus programs?
Polymorph
Both wired and wireless networks can use ________ or port security to enable you to blacklist or whitelist devices.
MAC filtering
Microsoft's encryption method of choice for a WAN is ________.
IPsec
What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?
Trojan
What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?
Social engineering
What term describes the process of cleaning up after a virus infection?
Remediation
An intrusion prevention system will ________.
prevent intrusion and also stop attacks as they are occurring
What is a piece of malicious code that gets passed from computer to computer by attaching itself to a program?
Virus
What can be used to create entries in the Security Log whenever a user logs on?
Event auditing
Which current authentication method is typically used over a LAN?
Kerberos
Sally is a member of multiple groups. A file has been granted different permissions to these different groups. What is Sally's effective permission?
Combined permissions of all groups
Physical security, authentication, users and groups, and security policies are all aspects of ________.
Access control
To lock down security settings on an individual system on a network, what would you use?
Local Security Policy
Most computer attacks are accomplished through what type of attack?
Social engineering
A user has a credit card–sized card used to prove her identity with a PIN. What is this card called?
Smart card
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?
Worm
A hardware firewall ________.
inspects incoming packets individually
Most Web sites today use ________ to encrypt connections.
TLS (Transport Layer Security)
Port forwarding enables you to open a port in a firewall and direct incoming traffic on that port to a(n) ________.
specific IP address on your LAN