Term
| What is it called when a user accesses resources in an unauthorized way? |
|
Definition
|
|
Term
| What should be backed up to protect the Registry and Security Settings? |
|
Definition
|
|
Term
| What is called when you move data from one pc to another? |
|
Definition
|
|
Term
| You format a hard drive that had sensitive data on it. What will be left on the hard drive? |
|
Definition
|
|
Term
| What is the process of using or manipulating people inside the networking environment to gain access to that network from the outside? |
|
Definition
|
|
Term
| What is it called when a hacker goes through the garbage looking for information? |
|
Definition
|
|
Term
| Physical security, authentication, the file system, users and groups, and security policies combine to make what? |
|
Definition
|
|
Term
| How does a computer determine who can or should access it? |
|
Definition
|
|
Term
| A user has a credit card - sized card used to prove her identity with a PIN. What is this card called? |
|
Definition
|
|
Term
| What could a computer use to determine a user's identity with the most authority? |
|
Definition
|
|
Term
| Sally is a member of multiple groups. A file has been granted different permissions to the different groups What is Sally's effective permission? |
|
Definition
| Combined permissions of all groups. |
|
|
Term
| To lock done security settings on a single commuter in a workgroup, what would you use? |
|
Definition
|
|
Term
| What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program. |
|
Definition
|
|
Term
| What is a software program that looks like one thing but doing something else? |
|
Definition
|
|
Term
| What is a complete program that travels form machine to machine through computer networks and has the capability to cause malicious problems? |
|
Definition
|
|
Term
| Together, what are Viruses, Trojans, and Worms called? |
|
Definition
|
|
Term
| Antivirus programs can passively monitor your computers activity. In this mode, what are they called? |
|
Definition
|
|
Term
| To make sure antivirus programs are useful as possible, what should be updated regularly? |
|
Definition
|
|
Term
| What type of virus attempts to change its signature to prevent detection by antivirus programs? |
|
Definition
|
|
Term
| What type of program runs in the background on your PC, sending information about your browsing habits to the company that installed it on your system? What type of program isn't destructive by itself, but leaches bandwidth in networks? |
|
Definition
|
|
Term
| Which authentication method sends passwords in clear text? |
|
Definition
|
|
Term
| What can be used to create entries in the Security log whenever a user logs on? |
|
Definition
|
|