Term
What is it called when a user accesses resources in an unauthorized way? |
|
Definition
|
|
Term
What should be backed up to protect the Registry and Security Settings? |
|
Definition
|
|
Term
What is called when you move data from one pc to another? |
|
Definition
|
|
Term
You format a hard drive that had sensitive data on it. What will be left on the hard drive? |
|
Definition
|
|
Term
What is the process of using or manipulating people inside the networking environment to gain access to that network from the outside? |
|
Definition
|
|
Term
What is it called when a hacker goes through the garbage looking for information? |
|
Definition
|
|
Term
Physical security, authentication, the file system, users and groups, and security policies combine to make what? |
|
Definition
|
|
Term
How does a computer determine who can or should access it? |
|
Definition
|
|
Term
A user has a credit card - sized card used to prove her identity with a PIN. What is this card called? |
|
Definition
|
|
Term
What could a computer use to determine a user's identity with the most authority? |
|
Definition
|
|
Term
Sally is a member of multiple groups. A file has been granted different permissions to the different groups What is Sally's effective permission? |
|
Definition
Combined permissions of all groups. |
|
|
Term
To lock done security settings on a single commuter in a workgroup, what would you use? |
|
Definition
|
|
Term
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program. |
|
Definition
|
|
Term
What is a software program that looks like one thing but doing something else? |
|
Definition
|
|
Term
What is a complete program that travels form machine to machine through computer networks and has the capability to cause malicious problems? |
|
Definition
|
|
Term
Together, what are Viruses, Trojans, and Worms called? |
|
Definition
|
|
Term
Antivirus programs can passively monitor your computers activity. In this mode, what are they called? |
|
Definition
|
|
Term
To make sure antivirus programs are useful as possible, what should be updated regularly? |
|
Definition
|
|
Term
What type of virus attempts to change its signature to prevent detection by antivirus programs? |
|
Definition
|
|
Term
What type of program runs in the background on your PC, sending information about your browsing habits to the company that installed it on your system? What type of program isn't destructive by itself, but leaches bandwidth in networks? |
|
Definition
|
|
Term
Which authentication method sends passwords in clear text? |
|
Definition
|
|
Term
What can be used to create entries in the Security log whenever a user logs on? |
|
Definition
|
|