Creado por Dakota Johnson
hace más de 5 años
|
||
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is known by what term?
Software installed on a computer that produces pop-up ads using your browser
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
You should beware of a person attempting to use your computer after you step away from it, a term referred to as...
A program that is potentially harmful or unwanted
What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software?
What command can be used to take full access of a file?
CryptoLocker is an example of what type of malware?
What keystroke should you press to get a logon window if you don't use the welcome screen?
A person that secretly peeks at your monitor screen while you work may be doing what?
Using a PIN or password in addition to TPM is an example of what type of authentication?
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using what?
Type of spyware that tracks your keystrokes, including passwords
What does the guest account in windows 7 have?
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
A type of malware that tricks you into opening it by substituting itself for a legitimate program.
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
What does the presence of the Cydia app on an iOS device indicate?
An attack that can be used to crack a long password by trying words and word combinations.
A code used to identify and authenticate a person or organization sending data over a network.
Is the guest account disabled or enabled by default?
A computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?
What technology can be used to locate a device such as a laptop after it has been stolen?
An infestation designed to copy itself repeatedly to memory, on drive space, or on a network.