Advertisement
Guest User

Chapter 18 - Fuck Discord

a guest
Feb 14th, 2019
2,823
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.63 KB | None | 0 0
  1. Why is it more secure to require a user to press Ctrl+Alt+Delete to log on rather than
  2. displaying the Windows Welcome screen?
  3. Malware can sometimes display a false welcome screen to trick users into providing user account passwords. A more secure method of logon is to require the user to press Ctrl+Alt+Delete to get to a logon window.
  4.  
  5. Which window in Control Panel is used to require a Windows password to wake up a
  6. sleeping computer?
  7. Power Options window
  8.  
  9. Which two tools can be used to reset a Windows password for another user when using Windows 7 Home Premium?
  10. netplwiz command or the Control Panel to reset a password for another user.
  11.  
  12. Why is PINE963$&apple not a strong password?
  13. Don't use words in any language
  14.  
  15. Which link in the Windows Firewall window allows you to add a port to the list of exceptions allowed through the firewall?
  16. click Allow a program or feature through Windows Firewall
  17.  
  18. Which policy in Group Policy must be enabled before you can monitor failed attempts at
  19. logging onto a Windows system?
  20. Audit logon event policy
  21.  
  22. What hardware component is needed to set up BitLocker Encryption so that you can
  23. authenticate the computer?
  24. Motherboard chip called the TPM Trusted Platform Module chip.
  25.  
  26. What Windows utility can you use to change the name of the built-in Administrator account?
  27. Group Policy
  28.  
  29. What type of employee badge does not have to be swiped by a card reader to allow the
  30. employee through a door?
  31. RFID badge
  32.  
  33. Which type of biometric data is considered the most secure?
  34. Retinal scanning
  35.  
  36. Which is better to destroy sensitive data on a hard drive, a low-level format, drill, or degausser?
  37. The degausser
  38.  
  39. What tool is best to use when destroying data on an SSD drive? Where can you get this tool?
  40. ATA Secure Erase, you can download a Secure Erase utility from the manufacturer of the device and run it to securely erase all data on the device.
  41.  
  42. What device can be installed on a laptop to prevent shoulder surfing?
  43. A privacy filter
  44. Define and explain the differences between a virus, worm, and Trojan.
  45. A virus is a program that replicates by attaching itself to other programs. The infected program must be executed for a virus to run.
  46. A worm is a program that copies itself throughout a network or the Internet without a host program. A worm creates problems by overloading the network as it replicates and can even hijack or install a server program such as a web server.
  47. A Trojan does not need a host program to work; rather, it substitutes itself for a legitimate program.
  48.  
  49. What are the two best ways to protect a computer or network against worms?
  50. Use antivirus software and firewall.
  51.  
  52. What is the best way to determine if an email message warning about a virus is a hoax?
  53. If you recieve an email stating your computer has a virus. It IS a hoax.
  54.  
  55. What is the first thing you should do when you discover a computer is infected with malware?
  56. Quarantine the computer
  57.  
  58. What does AV software look for to determine that a program or a process is a virus?
  59. Run a virus scan an unistall it or use a restore point
  60.  
  61. Which antispyware software is embedded in Windows 7?
  62. Windows Defender
  63.  
  64. Why is it helpful to run AV software in Safe Mode?
  65. Limited program/driver support. More secure mode if you use without networking.
  66.  
  67. What registry key keeps information about services that run when a computer is booted
  68. into Safe Mode?
  69. HKLM\System\CurrentControlSet\Control\Safeboot is the registry key that keeps this information. The subkeys under this are Minimal (safemode without networking) and Network (safe mode with networking)
  70.  
  71. What folder is used by Windows to hold restore points?
  72. The folder "System Volume Information" is a hidden system folder located in the root of the drive and is used by windows to hold system restore points. C:\System Volume Information\_ Restore folder
  73.  
  74. What must you do to allow AV software to scan and delete malware it might find in the data storage area where restore points are kept?
  75. Removing malware from System Restore points To remove malware you must first disable System Restore, then scan the system with up-to-date antivirus software - allowing it to clean, delete.
  76.  
  77.  
  78.  
  79.  
  80.  
  81. acceptable use policy (AUP)
  82. A document that explains to users what they can and cannot do on the corporate network or with company data, and the penalties for violations.
  83. access control list (ACL)
  84. A record or list of resources (for example, a printer, folder, or file) that a user, device, or program has access to on a corporate network, server, or workstation.
  85. anti-malware software
  86. Utility software that can prevent infection, scan a system, and detect and remove all types of general malware, including viruses, spyware, worms, and rootkits.
  87. antivirus software
  88. Utility software that can prevent infection, scan a system, and detect and remove viruses.
  89.  
  90. ATA Secure Erase
  91. Standards developed by the American National Standards Institute (ANSI) that dictate how to securely erase data from solid-state devices such as a USB flash drive or SSD drive in order to protect personal privacy.
  92. biometric authentication
  93. To authenticate to a network, computer, or other computing device by means of biometric data, such as a fingerprint or retinal data. Touch ID on an iPhone or face lock on an Android device can perform biometric authentication.
  94.  
  95. biometric device
  96. An input device that inputs biological data about a person; the data can identify a person's fingerprints, handprints, face, voice, eyes, and handwriting.
  97.  
  98. BitLocker Drive Encryption
  99. A utility in Windows 8/7/Vista that is used to lock down a hard drive by encrypting the entire Windows volume and any other volume on the drive.
  100. BitLocker To Go
  101. A Windows utility that can encrypt data on a USB flash drive and restrict access by requiring a password.
  102. botnet
  103. A network of zombies or robots. Also see zombies
  104.  
  105. brute force attack
  106. A method to hack or discover a password by trying every single combination of characters.
  107.  
  108. Bring Your Own Device (BYOD)
  109. A corporate policy that allows employees or students to connect their own devices to the corporate network.
  110. cellular network analyzer
  111. Software and hardware that can monitor cellular networks for signal.
  112. certification of destruction
  113. Digital or paper documentation, which ensures that data has been destroyed beyond recovery.
  114. Certification of Authority (CA)
  115. An organization, such as VeriSign, that assigns digital certificates or digital signatures to individuals or organizations.
  116. chain of custody
  117. Documentation that tracks evidence used in an investigation and includes exactly what, when, and from whom the evidence, and how the evidence was secured while in possession of a responsible party.
  118.  
  119. commercial license
  120. As applied to software, the rights to use the software, which have been assigned to the user by the software vendor. Also see source.
  121. copyright
  122. The right to copy the work that belongs to the creators of the works or others to whom the creator transfers this right.
  123.  
  124. data loss prevention (DLP)
  125. Methods that protect corporate data from being exposed or stolen; for example, software that filters employee email to verify privacy laws are not accidentally or intentionally being violated.
  126. degausser
  127. A machine that exposes a magnetic storage device such as a hard drive or tape drive to a strong magnetic field to completely erase the data on the storage device.
  128. dictionary attack
  129. A method to discover or crack a password by trying words in a dictionary.
  130. digital certificate
  131. A code used to authenticate the source of a file or document or to identify and authenticate a person or organization sending data over a network. The code is assigned by a certificate authority such as VeriSign and includes a public key for encryption. Also called digital ID or digital signature.
  132. digital rights management (DRM)
  133. Software and hardware security limitations meant to protect digital content and prevent piracy.
  134. email filtering
  135. To search incoming or outgoing email messages for matches kept in databases, searching known scams and spammers to protect against social engineering.
  136.  
  137. email hoax
  138. An email message that is trying to tempt you to give out personal information or trying to scam you.
  139. Encrypted File System (EFS)
  140. A way to use a key to encode a file or folder on an NTFS volume to protect sensitive data. Because it is an integrated system service, EFS is transparent to users and applications.
  141.  
  142. End User License Agreement (EULA)
  143. A digital or printed statement of your rights to use or copy software, which you agree to when the software is installed.
  144. enterprise license
  145. A license to use software that allows an organization to install multiple instances of the software. Also called site license.
  146. entry control roster
  147. A list of people allowed into a restricted area and a log of any approved visitors that is used and maintained by security guards.
  148. gpresult
  149. The Windows command to find out group policies that are currently applied to a system for the computer or user.
  150. gpupdate
  151. The Windows command to refresh local group policies as well as group policies set in Active Directory on a Windows domain.
  152. grayware
  153. A program that is potentially harmful or potentially unwanted.
  154. intrusion detection system (IDS)
  155. Software that can run on a UTM (Unified Threat Management) appliance, router, server, or workstation to monitor all network traffic and create alerts when suspicious activity happens.
  156. intrusion prevention system (IPS)
  157. Software that can run on a UTM (Unified Threat Management) appliance, router, server, or workstation to monitor all network traffic, create alerts, and prevent the threatening traffic from burrowing into the system.
  158. key fob
  159. A device , such as a type of smart card, that can fit conveniently on a key chain.
  160. keylogger
  161. A type of spyware that tracks your keystrokes, including passwords, chat room sessions, email messages, documents, online, purchases, and anything else you type on your computer. Text is logged to a text file and transmitted over the Internet without you knowledge.
  162.  
  163. Local Security Policy
  164. A Windows Administrative Tools snap-in in Control Panel that can manage the group of polices in the Local Computer Policy, Computer Configuration, Windows Settings, Security Settings group of Group Policy.
  165. Local Users and Groups
  166. For business and professional editions of Windows, a Windows utility console (lusrmgr.msc) that can be used to manage user accounts and user groups.
  167. LoJack
  168. A technology by Absolute Software used to track the whereabouts of a laptop computer and, if the computer is stolen, lock down access to the computer or erase data on it. The technology is embedded in the UEFI/BIOS of many laptops.
  169. malware
  170. Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software.
  171.  
  172. Types of infestations include viruses, Trojan horses, worms, adware, spyware, keyloggers, browser hijackers, dialers, and downloaders.
  173.  
  174. malware definition
  175. Information about malware that allows anti-malware software to detect and define malware. AKA malware signature.
  176. malware encyclopedia
  177. Lists of malware, including symptoms and solutions, often maintained by manufacturers of anti-malware and made available on their websites.
  178. man-in-the-middle attack
  179. An attack that pretends to be a legitimate website, network, FTP site, or person in a chat session in order to obtain private information.
  180. mantrap
  181. A physical security technique of using two doors on either end of a small entryway where the first door must close before the second door can open. A separate form of identification might be required for each door, such as a badge for the first door and a fingerprint scan for the second door. In addition, a security guard might monitor people as they come and go.
  182. multifactor authentication (MFA)
  183. To use more than one method to authenticate access to a computer, network, or other resource.
  184. mutual authentication
  185. To authenticate in both directions at the same time, as both entities confirm the identity of the other.
  186. next-generation firewall (NGFW)
  187. A firewall that combines firewall software with anti-malware software and other software that protects resources on a network.
  188. non compliant system
  189. A system that violates security best practices, such as out-of-date anti-malware software or no anti-malware software installed.
  190. personal license
  191. A license to use software that gives the right to install one instance of software.
  192. phishing
  193. Sending an email message with the intent of getting the user to reveal private information that can be used for identity theft. Also see spear phishing and spoofing.
  194.  
  195. privacy filter
  196. A device that fits over a monitor screen to prevent other people from viewing the monitor from a wide angle.
  197. quarantined computer
  198. A computer that is suspected of infection and is not allowed to use the network, is put on a different network dedicated to quarantined computers, or is allowed to access only certain network resources.
  199.  
  200. ransomware
  201. Malware that holds you computer system hostage with encryption techniques until you pay money or a time period expires when the encrypted content is destroyed.
  202. remote backup application
  203. A cloud backup service on the Internet that backs up data to the cloud and is often used for laptops, tablets, and smart phones.
  204. remote wipe
  205. Remotely erases all contacts, email, photos, and other data from a device to protect your privacy.
  206. RFID badge
  207. A badge worn by an employee and used to gain entrance into a locked area of a building. A Radio Frequency Identification token transmits authentication to the system when the token gets in range of a query device.
  208.  
  209. root certificate
  210. The original digital certificate issued by a Certification Authority.
  211. rootkit
  212. A type of malicious software that loads itself before the OS boot is complete and can hijack internal Windows components so that is masks information Windows provides to user-mode utilities such as File Explorer or Task Manager.
  213. security token
  214. A smart card or other device that is one factor in multifactor authentication or can serve as replacement for a password.
  215. shoulder surfing
  216. As you work, other people secretly peek at your monitor screen to gain valuable information
  217. site license
  218. A license that allows a company to install multiple copies of software, or to allow multiple employees to execute the software from a file server. AKA enterprise license.
  219. smart card
  220. Any small device that contains authentication information that can be keyed into a sign-in window or read by a reader to authenticate a user on a network.
  221.  
  222. smart card reader
  223. A device that can read a smart card used to authenticate a person onto a network.
  224.  
  225. social engineering
  226. The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
  227. software piracy
  228. The act of making unauthorized copies of original software.
  229. spear phishing
  230. A form of phishing where an email message appears to come from a company you already do business with.
  231. spoofing
  232. A phishing technique where you are tricked into clicking a link in an email message, which takes you to an official-looking website where you are asked to enter your user ID and password to enter the site.
  233. spyware
  234. Malicious software that installs itself on your computer or mobile device to spy on you. It collects personal information about you that it transmits over the Internet to web-hosting sites that intend to use your personal data for harm.
  235.  
  236. tailgating
  237. When someone who is unauthorized follows an employee through a secured entrance to a room or building.
  238. Trusted Platform Module (TPM)
  239. A chip on a motherboard that holds an encryption key required at startup to access encrypted data on the hard drive. Windows BitLocker Encryption can use the TPM chip.
  240. Trojan
  241. A type of malware that tricks you into downloading and/or opening it by substituting itself for a legitimate program.
  242.  
  243. Unified Threat Management (UTM)
  244. A computer security appliance, network appliance, or Internet appliance that stands between the Internet and a private network and runs firewall, anti-malware, and other software to protect the network.
  245. User Accounts
  246. A Windows utility (netplwiz.exe) that can be used to change the way Windows sign-in works and to manage user accounts, including changing passwords and changing the group membership of an account. AKA Network Places Wizard.
  247.  
  248. virus
  249. A program that often has an incubation period, is infectious, and is intended to cause damage. A virus program might destroy data and programs.
  250.  
  251. Wi-Fi analyzer
  252. Hardware and/or software that monitors a Wi-Fi network to detect devices not authorized to use the network, identify attempts to hack transmissions, or detect performance and security vulnerabilities.
  253. Windows Defender
  254. Anti-malware software embedded in Windows 8 that can detect, prevent, and clean up a system infected with viruses and other malware. Antispyware utility included in Windows 8/7/Vista.
  255.  
  256. Windows Firewall
  257. A personal firewall that protects a computer from intrusion and is automatically configured when you set your network location in the Network and Sharing Center.
  258.  
  259. worm
  260. An infestation designed to copy itself repeatedly to memory, on drive space, or on a network, until little memory, disk space, or network bandwidth remains.
  261.  
  262. zero-day attack
  263. When a hacker discovers and exploits a security hole in software before the developer of the software can develop and provide a protective patch to close the hole.
  264.  
  265. zombie
  266. A computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the knowledge of its user. Also see botnet.
  267. computer infestation
  268. Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. Types of infestations include viruses, Trojan horses,
  269. worms, adware, spyware, keyloggers, browser hijackers, dialers, and downloaders.
  270. Also called
  271. malware or malicious software.
  272. malicious software
  273. Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. Types of infestations include viruses, Trojan horses,
  274. worms, adware, spyware, keyloggers, browser hijackers, dialers, and downloaders.
  275. Also called
  276. malware or computer infestation.
  277. malware signature
  278. Information about malware
  279. that allows anti-malware software to detect and
  280. define malware.
  281. Also called
  282. a malware definition.
  283. Network Places Wizard
  284. A Windows utility (netplwiz.exe)
  285. that can be used to change the way Windows
  286. sign-in works and to manage user accounts,
  287. including changing passwords and changing the
  288. group membership of an account.
  289. Also called
  290. User Accounts.
  291. strong password
  292. A password that is not easy to guess.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement