Podcast
Questions and Answers
Which of the following is a characteristic of a 'factory reset'?
Which of the following is a characteristic of a 'factory reset'?
- It reinstates the device to its original shipped configuration, removing user customizations. (correct)
- It saves user data to a hibernation file.
- It uses an infrared camera to verify a user's face.
- It progressively delays unlock attempts after multiple failures.
What is the primary function of the 'failed login attempts restriction'?
What is the primary function of the 'failed login attempts restriction'?
- To create a template signature using a fingerprint scanner.
- To restore the device to its original state.
- To encrypt the disk using FileVault.
- To progressively limit or block unlock attempts after multiple incorrect tries. (correct)
Which of the following best describes the purpose of 'fast startup'?
Which of the following best describes the purpose of 'fast startup'?
- It searches the file system for specific files.
- It manages files and folders in macOS.
- It encrypts the disk using FileVault disk encryption.
- It saves an image of system memory to a hibernation file, enabling swift resumption from sleep. (correct)
Which authentication mechanism relies on an infrared camera to verify a user's identity?
Which authentication mechanism relies on an infrared camera to verify a user's identity?
What is specific to 'firmware'?
What is specific to 'firmware'?
What is a key function of a 'fingerprint scanner'?
What is a key function of a 'fingerprint scanner'?
Which authentication method requires the user to scan their fingerprint?
Which authentication method requires the user to scan their fingerprint?
Which of these is an example of a command-line Linux tool, according to the text?
Which of these is an example of a command-line Linux tool, according to the text?
What is the primary function of a GUID Partition Table (GPT)?
What is the primary function of a GUID Partition Table (GPT)?
Which of the following would be categorized as a hardware-based authentication device?
Which of the following would be categorized as a hardware-based authentication device?
What is the main purpose of checking the Hardware Compatibility List (HCL) before OS installation?
What is the main purpose of checking the Hardware Compatibility List (HCL) before OS installation?
The principle of 'implicit deny' in security means what?
The principle of 'implicit deny' in security means what?
What is the key characteristic of a social engineering attack?
What is the key characteristic of a social engineering attack?
Which is NOT a direct consideration when planning the installation of new apps?
Which is NOT a direct consideration when planning the installation of new apps?
What does the acronym IRP stand for in the context of cybersecurity?
What does the acronym IRP stand for in the context of cybersecurity?
What is a cryptographic module's primary function within a hardware security device?
What is a cryptographic module's primary function within a hardware security device?
Which security measure primarily aims to prevent the retrieval of data from storage media?
Which security measure primarily aims to prevent the retrieval of data from storage media?
What is the primary purpose of considering 'physical placement' in IT security?
What is the primary purpose of considering 'physical placement' in IT security?
Which of the following describes a method by which a threat actor might gain unauthorized access to a restricted area?
Which of the following describes a method by which a threat actor might gain unauthorized access to a restricted area?
Which authentication method is used on mobile devices to restrict access using a numeric code?
Which authentication method is used on mobile devices to restrict access using a numeric code?
What is the function of a preboot execution environment (PXE) in networking?
What is the function of a preboot execution environment (PXE) in networking?
Which of the following best describes the purpose of a pre-shared key (PSK)?
Which of the following best describes the purpose of a pre-shared key (PSK)?
Which technology is described as a command shell and scripting language based on the .NET Framework?
Which technology is described as a command shell and scripting language based on the .NET Framework?
Which of the following actions would help to mitigate the risk of data remnants being left behind after disposing of a storage device?
Which of the following actions would help to mitigate the risk of data remnants being left behind after disposing of a storage device?
What is the primary function of a port triggering mechanism within a firewall?
What is the primary function of a port triggering mechanism within a firewall?
Which scenario best illustrates the concept of 'phishing' as described in the text?
Which scenario best illustrates the concept of 'phishing' as described in the text?
What is the main purpose of the 'Power Options' control panel app mentioned here?
What is the main purpose of the 'Power Options' control panel app mentioned here?
What type of data is referred to as 'Personally Identifiable Information (PII)'?
What type of data is referred to as 'Personally Identifiable Information (PII)'?
The term 'power users' in this context refers to what?
The term 'power users' in this context refers to what?
Which of the following is NOT a function of the 'Windows Settings' pages mentioned in context?
Which of the following is NOT a function of the 'Windows Settings' pages mentioned in context?
What does 'power failure', as used in the text, refer to?
What does 'power failure', as used in the text, refer to?
Which of the following best describes the use of 'themes' for a desktop environment?
Which of the following best describes the use of 'themes' for a desktop environment?
What occurs when a data file is not saved to contiguous sectors on a hard disk drive (HDD)?
What occurs when a data file is not saved to contiguous sectors on a hard disk drive (HDD)?
Which tool is used to mitigate fragmentation on hard drives?
Which tool is used to mitigate fragmentation on hard drives?
In Linux, what allows multiple user sessions to be supported on a single host?
In Linux, what allows multiple user sessions to be supported on a single host?
What is a denial of service (DoS) attack primarily concerned with?
What is a denial of service (DoS) attack primarily concerned with?
What security measure is performed on email and Internet traffic to identify and block suspicious content?
What security measure is performed on email and Internet traffic to identify and block suspicious content?
Which of the following is NOT an advantage of using a command shell in system management?
Which of the following is NOT an advantage of using a command shell in system management?
What type of attack can affect the availability of a managed resource through various means?
What type of attack can affect the availability of a managed resource through various means?
What does performance optimization on solid-state drives (SSDs) involve?
What does performance optimization on solid-state drives (SSDs) involve?
What is the primary responsibility of a Computer Security Incident Response Team (CSIRT)?
What is the primary responsibility of a Computer Security Incident Response Team (CSIRT)?
Which of the following best describes 'cross-site scripting' (XSS)?
Which of the following best describes 'cross-site scripting' (XSS)?
What are the three principles of the CIA triad in cybersecurity?
What are the three principles of the CIA triad in cybersecurity?
Which description accurately represents cryptominer malware?
Which description accurately represents cryptominer malware?
What is commonly referred to as the AIC triad in cybersecurity?
What is commonly referred to as the AIC triad in cybersecurity?
What is a primary goal of implementing password complexity requirements?
What is a primary goal of implementing password complexity requirements?
Which of the following best defines configuration management in cybersecurity?
Which of the following best defines configuration management in cybersecurity?
What is the intended effect of the CIA triad on cybersecurity practices?
What is the intended effect of the CIA triad on cybersecurity practices?
What happens to the existing operating system and data files when a target disk is repartitioned and formatted?
What happens to the existing operating system and data files when a target disk is repartitioned and formatted?
What is the primary function of a 'cron job' in a Linux environment?
What is the primary function of a 'cron job' in a Linux environment?
Which statement best describes the 'command and control' (C2 or C&C) infrastructure?
Which statement best describes the 'command and control' (C2 or C&C) infrastructure?
What does 'CCMP' stand for in the context of wireless LAN security?
What does 'CCMP' stand for in the context of wireless LAN security?
What is a primary concern when ensuring compatibility across multiple device and OS platforms?
What is a primary concern when ensuring compatibility across multiple device and OS platforms?
What does the command 'cp' accomplish in a Linux command line?
What does the command 'cp' accomplish in a Linux command line?
Which of the following statements accurately defines a compatibility concern in application use?
Which of the following statements accurately defines a compatibility concern in application use?
What task does the Linux cron daemon primarily perform?
What task does the Linux cron daemon primarily perform?
What is the primary function of desktop management software as described?
What is the primary function of desktop management software as described?
What might be a consequence of the developer mode feature in mobile devices?
What might be a consequence of the developer mode feature in mobile devices?
Which of the following is a characteristic of digital rights management (DRM)?
Which of the following is a characteristic of digital rights management (DRM)?
What does the Control Panel Legacy management interface predominantly manage?
What does the Control Panel Legacy management interface predominantly manage?
How do changes to desktop styles over updates typically affect users?
How do changes to desktop styles over updates typically affect users?
What is one of the primary purposes of digital media DRM solutions?
What is one of the primary purposes of digital media DRM solutions?
Which command is primarily associated with desktop management tasks?
Which command is primarily associated with desktop management tasks?
What is a potential risk associated with using developer mode on mobile devices?
What is a potential risk associated with using developer mode on mobile devices?
What does the Apple File System (APFS) primarily serve as?
What does the Apple File System (APFS) primarily serve as?
What is the purpose of an authenticator app in the context of security?
What is the purpose of an authenticator app in the context of security?
Which of the following actions does subject identification typically involve?
Which of the following actions does subject identification typically involve?
What function does the AutoRun/AutoPlay feature serve in Windows operating systems?
What function does the AutoRun/AutoPlay feature serve in Windows operating systems?
How does automation benefit configuration steps in technology?
How does automation benefit configuration steps in technology?
In what way does Apple ID function as a cloud-based service?
In what way does Apple ID function as a cloud-based service?
What is a characteristic feature of the APK Android app package format?
What is a characteristic feature of the APK Android app package format?
What is the significance of creating an audit trail during subject identification?
What is the significance of creating an audit trail during subject identification?
What is the primary function of the group policy editor (gpedit.msc)?
What is the primary function of the group policy editor (gpedit.msc)?
How does a guest account function within a network environment?
How does a guest account function within a network environment?
What does the term 'image deployment' refer to?
What does the term 'image deployment' refer to?
Which command tool is primarily used to gather information about the IP configuration?
Which command tool is primarily used to gather information about the IP configuration?
What does a 4-port LAN switch allow for in a network setup?
What does a 4-port LAN switch allow for in a network setup?
What is a key function of a firewall in a networking context?
What is a key function of a firewall in a networking context?
Which features are integrated with iCloud in terms of user experience?
Which features are integrated with iCloud in terms of user experience?
What is the purpose of implementing group policy objects (GPO) in a Windows domain?
What is the purpose of implementing group policy objects (GPO) in a Windows domain?
What role does a ground wire play in an electrical system?
What role does a ground wire play in an electrical system?
Which of the following best describes Extensible Authentication Protocol (EAP)?
Which of the following best describes Extensible Authentication Protocol (EAP)?
What is a primary characteristic of fileless malware?
What is a primary characteristic of fileless malware?
Which technology allows an operating system to utilize a mass storage device?
Which technology allows an operating system to utilize a mass storage device?
How does facial recognition function as an authentication method?
How does facial recognition function as an authentication method?
What does the process of negotiating authentication methods encompass in an EAP framework?
What does the process of negotiating authentication methods encompass in an EAP framework?
What is a primary function of a ground wire when a short circuit occurs?
What is a primary function of a ground wire when a short circuit occurs?
Which of the following accurately describes a benefit of using hardware-based identifiers in authentication?
Which of the following accurately describes a benefit of using hardware-based identifiers in authentication?
What is the main purpose of the least privilege principle in security?
What is the main purpose of the least privilege principle in security?
Which format is used to express an IPv4 address?
Which format is used to express an IPv4 address?
What role does the 'ip' command play in Linux networking?
What role does the 'ip' command play in Linux networking?
What is the purpose of a lessons learned report (LLR)?
What is the purpose of a lessons learned report (LLR)?
How are IPv6 addresses typically represented?
How are IPv6 addresses typically represented?
What is a key aspect of physical security mechanisms concerning lighting?
What is a key aspect of physical security mechanisms concerning lighting?
What does the term 'configuration' refer to when discussing network settings?
What does the term 'configuration' refer to when discussing network settings?
Which of the following best describes the role of an Internet Protocol (IP) address?
Which of the following best describes the role of an Internet Protocol (IP) address?
Flashcards
Complexity Requirement Rules
Complexity Requirement Rules
Guidelines for creating strong passwords to enhance security.
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
A type of attack where malicious scripts are injected into trusted websites.
Computer Security Incident Response Team (CSIRT)
Computer Security Incident Response Team (CSIRT)
A group responsible for responding to security incidents across various domains.
Cryptominer
Cryptominer
Signup and view all the flashcards
CIA Triad
CIA Triad
Signup and view all the flashcards
Information Security Triad (AIC Triad)
Information Security Triad (AIC Triad)
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Configuration Management
Configuration Management
Signup and view all the flashcards
Face Recognition Lock
Face Recognition Lock
Signup and view all the flashcards
Fingerprint Lock
Fingerprint Lock
Signup and view all the flashcards
Factory Reset
Factory Reset
Signup and view all the flashcards
Failed Login Attempts Restriction
Failed Login Attempts Restriction
Signup and view all the flashcards
Firmware
Firmware
Signup and view all the flashcards
Bio-Gesture Authentication
Bio-Gesture Authentication
Signup and view all the flashcards
Fast Startup
Fast Startup
Signup and view all the flashcards
Command-Line Tool
Command-Line Tool
Signup and view all the flashcards
Defragmentation
Defragmentation
Signup and view all the flashcards
Optimization Operations
Optimization Operations
Signup and view all the flashcards
Denial of Service Attack (DoS)
Denial of Service Attack (DoS)
Signup and view all the flashcards
Content Filtering
Content Filtering
Signup and view all the flashcards
Graphical OS Interface
Graphical OS Interface
Signup and view all the flashcards
Linux Virtual Console
Linux Virtual Console
Signup and view all the flashcards
Command Shell
Command Shell
Signup and view all the flashcards
Fragmentation
Fragmentation
Signup and view all the flashcards
GUID Partition Table (GPT)
GUID Partition Table (GPT)
Signup and view all the flashcards
Hardware Compatibility List (HCL)
Hardware Compatibility List (HCL)
Signup and view all the flashcards
Implicit Deny
Implicit Deny
Signup and view all the flashcards
Incident Response Plan (IRP)
Incident Response Plan (IRP)
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Cryptographic Module
Cryptographic Module
Signup and view all the flashcards
Smart Card
Smart Card
Signup and view all the flashcards
USB Token Storage Key
USB Token Storage Key
Signup and view all the flashcards
Physical Data Destruction
Physical Data Destruction
Signup and view all the flashcards
PowerShell (PS)
PowerShell (PS)
Signup and view all the flashcards
Preboot Execution Environment (PXE)
Preboot Execution Environment (PXE)
Signup and view all the flashcards
Piggybacking in Security
Piggybacking in Security
Signup and view all the flashcards
Pre-shared Key (PSK)
Pre-shared Key (PSK)
Signup and view all the flashcards
Physical Placement Considerations
Physical Placement Considerations
Signup and view all the flashcards
Degaussing
Degaussing
Signup and view all the flashcards
Incineration of Data Media
Incineration of Data Media
Signup and view all the flashcards
PII
PII
Signup and view all the flashcards
Port Triggering
Port Triggering
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Power Failure
Power Failure
Signup and view all the flashcards
Power Options
Power Options
Signup and view all the flashcards
Phone Settings
Phone Settings
Signup and view all the flashcards
Inbound Access
Inbound Access
Signup and view all the flashcards
Subject Identification
Subject Identification
Signup and view all the flashcards
APK
APK
Signup and view all the flashcards
Authenticator App
Authenticator App
Signup and view all the flashcards
Apple File System (APFS)
Apple File System (APFS)
Signup and view all the flashcards
Apple ID
Apple ID
Signup and view all the flashcards
AutoRun/AutoPlay
AutoRun/AutoPlay
Signup and view all the flashcards
File Sharing
File Sharing
Signup and view all the flashcards
Backup Synchronization
Backup Synchronization
Signup and view all the flashcards
Counter Mode
Counter Mode
Signup and view all the flashcards
Command and Control (C2)
Command and Control (C2)
Signup and view all the flashcards
CP Command
CP Command
Signup and view all the flashcards
Credit Card Transactions
Credit Card Transactions
Signup and view all the flashcards
Cron Job
Cron Job
Signup and view all the flashcards
CCMP Protocol
CCMP Protocol
Signup and view all the flashcards
Compatibility Concerns
Compatibility Concerns
Signup and view all the flashcards
Formatted Disk
Formatted Disk
Signup and view all the flashcards
Desktop Styles
Desktop Styles
Signup and view all the flashcards
Control Panel
Control Panel
Signup and view all the flashcards
Digital Rights Management (DRM)
Digital Rights Management (DRM)
Signup and view all the flashcards
Developer Mode
Developer Mode
Signup and view all the flashcards
Remote Support Software
Remote Support Software
Signup and view all the flashcards
Malicious Content
Malicious Content
Signup and view all the flashcards
Inappropriate Content
Inappropriate Content
Signup and view all the flashcards
Group Policy Object (GPO)
Group Policy Object (GPO)
Signup and view all the flashcards
iCloud
iCloud
Signup and view all the flashcards
Guest Account
Guest Account
Signup and view all the flashcards
Deployment Method
Deployment Method
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
LAN Switch
LAN Switch
Signup and view all the flashcards
Policy Editor (gpedit.msc)
Policy Editor (gpedit.msc)
Signup and view all the flashcards
Network Configuration
Network Configuration
Signup and view all the flashcards
Ground Wire
Ground Wire
Signup and view all the flashcards
Extensible Authentication Protocol (EAP)
Extensible Authentication Protocol (EAP)
Signup and view all the flashcards
Biometric Authentication
Biometric Authentication
Signup and view all the flashcards
Fileless Malware
Fileless Malware
Signup and view all the flashcards
Mass Storage Devices
Mass Storage Devices
Signup and view all the flashcards
Partition Formatting
Partition Formatting
Signup and view all the flashcards
Secure Tunnels
Secure Tunnels
Signup and view all the flashcards
Browser Add-on
Browser Add-on
Signup and view all the flashcards
Least Privilege
Least Privilege
Signup and view all the flashcards
IP Address (IPv4)
IP Address (IPv4)
Signup and view all the flashcards
IP Address (IPv6)
IP Address (IPv6)
Signup and view all the flashcards
iOS
iOS
Signup and view all the flashcards
Lighting in Security
Lighting in Security
Signup and view all the flashcards
Logical Host Addressing
Logical Host Addressing
Signup and view all the flashcards
Lessons Learned Report (LLR)
Lessons Learned Report (LLR)
Signup and view all the flashcards
Study Notes
Core Glossary
- 2-step verification: Authentication mechanism using a separate channel for sign-on attempts or to transmit an additional credential. This can use email, SMS, or voice calls.
- 3-2-1 backup rule: Best practice for data backups. Maintaining three copies of data on two types of media, with one copy stored off-site.
- 32-bit versus 64-bit: Processing modes referring to CPU instruction size. 32-bit CPUs were common earlier but 64-bit CPUs are now more common in PCs. 64-bit software can typically run on 64-bit CPUs, but 32-bit software can often run on 64-bit CPUs.
- 802.1X: Standard for encapsulating EAP communications over LAN or WLAN to implement port-based authentication.
- Acceptable Use Policy (AUP): Policy governing employee computer and internet use. Internet Service Providers (ISPs) can also implement AUPs.
- Access Control List (ACL): Collection of access control entries that determine which subjects (user accounts, IPs, etc.) can access objects and their privileges.
- Access Control Vestibule: Security system with two gateways, only one open at a time.
- Accessibility Prefpane: macOS utility for desktop and input/output accessibility configuration.
- Accounts settings: Windows settings for user account creation and maintenance.
- Active Directory (AD): Network directory service for Microsoft Windows domain networks. Facilitates authentication and authorization of user and computer accounts.
- Active listening: Technique in communication to ensure all information, including nonverbal cues, is captured from the other person. This includes summarizing, reflecting, interpreting and attending to the speaker.
Additional Glossary Terms
- Ad blocker: Browser feature preventing third-party content display.
- Administrative tools: Folder in Control Panel containing default Microsoft management consoles for local system configuration.
- Administrator: Privileged account with membership in the Administrators security group.
- Advanced Encryption Standard (AES): Symmetric 128-, 192-, or 256-bit block cipher.
- AirDrop: iOS feature for simple file sharing via Bluetooth.
- Alarm system: Physical intrusion detection system with triggers like circuit, motion, proximity, or duress.
- Android: Open-source mobile operating system developed by the Open Handset Alliance (primarily Google).
- Antivirus scan (A-V): Software detecting and removing virus infections and malware.
- APK: Android app package format.
- App: Default extension for a macOS app subdirectory within Applications folder.
- Apple File System (APFS): Default file system for macOS computers.
- Apple ID: Cloud-based service for synchronizing settings, manage apps, and backups.
- Application programming interface (API): Methods that allow programs to interact with each other, for example interactions with TCP/IP or networking functions.
- Apps settings: Windows Settings pages for configuring Windows Features and third-party software apps.
- apt-get: Linux package management tool for installing and updating software.
- Asset: Item of economic value. Businesses manage these with location, attributes, and value tracked in a database.
- Asset tagging: Assigning an ID to assets to link them with inventory databases.
- Asymmetric encryption cipher: Cipher using public and private keys, linked mathematically. The private key is not created from the public key. For example, RSA or ECC algorithms.
- Authentication, authorization, and accounting (AAA): Security concept for identifying users, ensuring permissions and recording actions.
- Authenticator app: Software that acts as a second authentication factor.
- Automation: Use of scripts to perform configuration steps, avoiding manual intervention.
- AutoRun/AutoPlay: Windows mechanisms for automatic actions when peripheral storage devices are connected.
- Backdoor: Accessing a computer bypassing normal authentication, typically for malicious purposes.
- Backup: Security copy of data (often scheduled). Examples include full, incremental, or differential back ups.
- Backup chain: Backup sequence consisting of a full backup and incremental or differential backups following it.
- Badge reader: Authentication mechanism using smart cards for access control.
- Bash: Command interpreter and scripting language for Unix-like systems.
- BAT: Extension for batch files (containing Windows CMD commands).
- BIOS/UEFI password: Passwords set in system firmware to protect against unauthorized booting or configuration changes. and many more... (too many to list here)
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.