1/38
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Operating System
It plays a critical role in the operation of a computer system and is the target of many attacks.
administrator
An ___________________________ hardens an operating system by modifying the default configuration to make it more secure to outside threats.
Host Hardening
This process includes the removal of unnecessary programs and services.
patches,
updates
Another critical requirement of hardening operating systems is the application of security __________________ and ___________________.
antimalware
It is important to protect computers and mobile devices using reputable ____________________________ software
Patch Management
It is the code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack.
service pack
Manufacturers combine patches and upgrades into a comprehensive update application called a _____________________________.
Host-based Firewalls / software firewall
It is a program that runs on a computer to allow or deny traffic between the computer and other connected computers.
Host-based Firewalls / software firewall
It applies a set of rules to data transmissions through inspection and filtering of data packets.
Host Intrusion Detection Systems (HIDS)
It is software that runs on a host computer that monitors suspicious activity.
Virtual Private Network (VPN)
When connecting to the local network and sharing files, the communication between computers remains within that network. To communicate and share resources over a network that is not secure, users employ a _____________________________________________.
Virtual Private Network (VPN)
is a private network that connects remote sites or users together over a public network, like the Internet
Wired Equivalent Privacy (WEP)
One of the most important components of modern computing are mobile devices.
Wired Equivalent Privacy (WEP)
It is one of the first widely used Wi-Fi security standards. It provides authentication and encryption protections
WPA and WPA2.
The next major improvement to wireless security was the introduction of ________________________
Wi-Fi Protected Access (WPA)
was the computer industry's response to the weakness of the WEP standard.
Mutual Authentication
The imposter can launch a man-in-the-middle attack which is very difficult to detect and can result in stolen login credentials and transmitted data. To prevent rogue access points, the computer industry developed ____________________________________________________.
Mutual Authentication
It is a process or technology in which both entities in a communications link authenticate to each other.
two-way authentication
What is the other term for Mutual Authentication?
File Access Control
This consists of permissions that limit folder or file access for an individual or for a group of users.
File Encryption
It is a tool used to protect data stored in the form of files.
Encryption
transforms data using a complicated algorithm to make it unreadable.
True
True or false:
Software programs can encrypt files, folders, and even entire drives
data backup
It stores a copy of the information from a computer to removable backup media.
True
True or false:
Backing up data is one of the most effective ways of protecting against data loss.
Content control
This software restricts the content that a user can access with a web browser over the Internet.
Content control
It can block sites that contain certain types of material such as pornography or controversial religious or political content.
Disk Cloning and Deep Freeze
With this, many third party applications are available to restore a system back to a default state. This allows the administrator to protect the operating system and configuration files for a system.
Disk cloning
It copies the contents of the computer's hard disk to an image file.
Deep Freeze
It "freezes" the hard drive partition. When a user restarts the system, the system reverts to its frozen configuration. The system does not save any changes that the user makes, so any applications installed or files saved are lost when the system restarts
cable locks,
telecommunication,
cages
There are several methods of physically protecting computer equipment:
- Use ______________________.
- Keep _________________________________ rooms locked.
- Use security __________________ around equipment.
Logout Timers
This is helpful when an employee gets up and leaves his computer to take a break. If the employee does not take any action to secure his workstation, any information on that system is vulnerable to an unauthorized user.
Logout Timers
It will make sure that the employee's account is logged out after a certain amount of time to make sure no one will sneak to his/her computer without permission
Idle Timeout and Screen Lock
Employees may or may not log out of their computer when they leave the workplace. So what are the best thing to do?
Idle Timeout and Screen Lock
it is a security best practice to configure an idle timer that will automatically lock the screen and sometimes may automatically logout the user.
Login Times
In some situations, an organization may want employees to log in during specific hours, such as 7 a.m. to 6 p.m.
GPS Tracking
It uses satellites and computers to determine the location of a device. This technology is a standard feature on smartphones that provides real-time position tracking.
100
GPS tracking can pinpoint a location within ____ meters
Radio frequency identification (RFID)
It uses radio waves to identify and track objects. Its inventory systems use tags attached to all items that an organization wants to track.