Created by Dakota Johnson
over 5 years ago
|
||
Question | Answer |
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is known by what term? | Chain of Custody |
Software installed on a computer that produces pop-up ads using your browser | Adware |
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? | rootkit |
You should beware of a person attempting to use your computer after you step away from it, a term referred to as... | tailgating |
A program that is potentially harmful or unwanted | grayware |
What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software? | Copyright |
What command can be used to take full access of a file? | icacls |
CryptoLocker is an example of what type of malware? | ransomware |
What keystroke should you press to get a logon window if you don't use the welcome screen? | ctrl+alt+del |
A person that secretly peeks at your monitor screen while you work may be doing what? | Shoulder Surfing |
Using a PIN or password in addition to TPM is an example of what type of authentication? | multifactor |
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild? | malware signatures |
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using what? | The bios |
Type of spyware that tracks your keystrokes, including passwords | keylogger |
What does the guest account in windows 7 have? | administrative access |
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? | smart card |
A type of malware that tricks you into opening it by substituting itself for a legitimate program. | trojan |
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive? | degausser |
The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer. | social engineering |
What does the presence of the Cydia app on an iOS device indicate? | The device has been jailbroken |
An attack that can be used to crack a long password by trying words and word combinations. | dictionary attack |
A code used to identify and authenticate a person or organization sending data over a network. | digital certificate |
Is the guest account disabled or enabled by default? | disabled |
A computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge | zombie |
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? | TPM Chip on the Mobo |
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? | man in the middle |
What technology can be used to locate a device such as a laptop after it has been stolen? | lojack |
An infestation designed to copy itself repeatedly to memory, on drive space, or on a network. | worm |
Want to create your own Flashcards for free with GoConqr? Learn more.