1100 Ch13: Security
25 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of InPrivate browsing in MS Edge?

  • To disable all internet connections.
  • To permanently save browsing data.
  • To enhance download speeds.
  • To browse anonymously without retaining information. (correct)
  • What is a common characteristic of unwanted pop-ups?

  • They always provide substantial information.
  • They help enhance user experience.
  • They are initiated by advertisers or websites. (correct)
  • They are always automatically blocked.
  • How can the SmartScreen Filter in MS Edge help users?

  • By enhancing video playback quality.
  • By analyzing websites for suspicious items. (correct)
  • By permanently deleting cookies.
  • By blocking all advertisements.
  • To enable ActiveX filtering in web browsers, what should users be cautious about?

    <p>ActiveX controls can be used for malicious purposes.</p> Signup and view all the answers

    Which menu option allows you to access the Clear browsing data feature in MS Edge?

    <p>Privacy, search, and services.</p> Signup and view all the answers

    What is a primary function of pop-up blockers in web browsers?

    <p>To limit or block unwanted pop-up windows.</p> Signup and view all the answers

    What must be selected to open an InPrivate window in MS Edge?

    <p>New InPrivate window.</p> Signup and view all the answers

    Which feature in Microsoft Edge specifically detects phishing websites?

    <p>SmartScreen Filter.</p> Signup and view all the answers

    What happens to cookies and files after ending an InPrivate browsing session?

    <p>They are deleted.</p> Signup and view all the answers

    What is the main purpose of enabling ActiveX filtering in Internet Explorer 11?

    <p>To allow only approved websites to run ActiveX controls</p> Signup and view all the answers

    What action is recommended to enhance security in AutoPlay settings?

    <p>Disable AutoPlay to prevent automatic running of media</p> Signup and view all the answers

    What is the main difference between AutoRun and AutoPlay?

    <p>AutoRun runs automatically, AutoPlay requires user input</p> Signup and view all the answers

    How can you disable AutoPlay on a Windows system?

    <p>Use Control Panel, uncheck AutoPlay option, and save</p> Signup and view all the answers

    What does a service pack usually contain?

    <p>Combined patches and upgrades for security improvements</p> Signup and view all the answers

    What happens when ActiveX filtering is turned on for a website?

    <p>Only ActiveX controls from approved sites can run</p> Signup and view all the answers

    What is the key reason for applying security patches and OS updates?

    <p>To protect against newly discovered vulnerabilities</p> Signup and view all the answers

    What is the primary function of email filters?

    <p>To filter email messages before they reach the user's inbox.</p> Signup and view all the answers

    Which action is NOT recommended when encountering a suspicious warning window?

    <p>Click inside the warning window.</p> Signup and view all the answers

    What method do Linux users use to prevent installation of untrusted software?

    <p>Cryptographic signing with a public key.</p> Signup and view all the answers

    What is a potential risk of installing software from untrusted sources?

    <p>It may spread malware like Trojans.</p> Signup and view all the answers

    What is the role of User Account Control (UAC) in preventing malware installation on Windows?

    <p>It restricts installation of untrusted software.</p> Signup and view all the answers

    Which feature helps users detect rogue antivirus products while browsing?

    <p>SmartScreen filter.</p> Signup and view all the answers

    Which mobile OS model helps prevent the installation of untrusted software?

    <p>Walled garden model.</p> Signup and view all the answers

    What regular action is necessary to ensure anti-malware software remains effective?

    <p>Updating the software regularly.</p> Signup and view all the answers

    What should users do if a suspicious tab or warning does not close normally?

    <p>Scan using a trusted antivirus program.</p> Signup and view all the answers

    Study Notes

    Chapter 13: Security

    • Attacks threaten computer security and data, including physical equipment (servers, switches, wiring) and data (access, theft, loss).
    • Malware is a significant threat, encompassing viruses, Trojans, adware, ransomware, rootkits, spyware, and worms.
    • Common attacks include TCP/IP attacks (DoS, spoofing, syn flood, man-in-the-middle), and social engineering (phishing, pretexting, baiting, dumpster diving).
    • Security policy defines the objectives for protecting network, data, and computers within an organization. It specifies authorized users, password requirements, and acceptable network usage, along with incident response procedures for remote users.
    • Host-based firewalls, like Windows Defender, manage access to programs and ports.
    • Wireless security configuration is critical for protecting networks.
    • Troubleshooting security problems involves six documented steps.
    • Malware is malicious software designed by cybercriminals to disrupt systems and networks.
    • Malware is typically installed secretly and, once active, can modify computer settings, delete files, and corrupt hard drives.

    Malware Types

    • Viruses: Self-replicating programs that attach to code, software, or documents. They can alter files, corrupt applications, and send sensitive information.
    • Trojan Horses: Disguised as legitimate software, they give attackers unauthorized access to a system.
    • Adware: Software that displays advertisements.
    • Ransomware: Software that encrypts files and demands a ransom for decryption keys.
    • Rootkit: A specialized type of software that gives the perpetrator administrator account-level access.
    • Spyware: Software that gathers information without user consent.
    • Worms: Self-replicating programs that use network vulnerabilities to spread. Attackers may use these programs to slow or disrupt network operations.

    How Malware Infects

    • Users visiting infected websites
    • Outdated antivirus software
    • Vulnerable web browsers
    • Downloading "free" programs
    • Opening unsolicited email
    • Exchanging files on file-sharing sites
    • Infected computers sharing files
    • USB devices found in public areas
    • Opening attachments from instant messaging or social media
    • Non-compliant systems (lacking updates and security software) are particularly susceptible.

    Malware Removal

    • Identify and research symptoms.
    • Quarantine infected systems.
    • Disable system restore in Windows.
    • Remediate infected systems.
    • Run scheduled scans and updates.
    • Enable System Restore and create restore points.
    • Educate the end user.

    Anti-Malware Programs

    • Anti-malware programs (antivirus) continuously scan for known malware signatures and behaviors.
    • Anti-malware programs should be up to date to provide the latest protection against the newest viruses
    • Using several anti-malware packages in combination slows down the computer.
    • Anti-malware programs may automatically quarantine or delete detected threats, or prompt the user.

    Protecting Against Social Engineering

    • Train users to recognize social engineering tactics (phishing, pretexting, baiting, dumpster diving).
    • Implement a security policy outlining acceptable use, password rules, and response to security incidents.
    • Install firewalls and security software.
    • Use strong passwords.
    • Lock or sign out of computers when unattended.

    Physical Security

    • Secure entrances and restricted areas to prevent tailgating, and shoulder surfing.
    • Use security systems like mantraps to limit entry points.
    • Secure network equipment to prevent tampering and theft.
    • Limit access to sensitive data.

    Data Protection

    • Backups are important because of potential security issues and data loss.
    • Security for backup data is important.
    • Implement encryption, access controls, and secure storage for backup data.
    • Regularly validate backups to ensure accuracy and usability.

    Common Security Policies

    • Acceptable Use Policies: Define acceptable network resource uses.
    • Remote Access Policies: Specify how remote users can access the network.
    • Network Maintenance Policies: Outline procedures for network device management.
    • Incident Handling Policies: Outline security response actions upon incident discovery.
    • Identification & Authentication Policies: Identify authorized users with outlined verification procedures.
    • Password Policies: Enforce password length, complexity, and regular changes.

    Wireless Security

    • Secure Wi-Fi networks using strong passwords.
    • Change default passwords for networks.
    • Do not broadcast the Wi-Fi network name.

    System Configurations

    • Review Windows Firewall settings.
    • Configure security policies in Windows.
    • Use the Windows Firewall with Advanced Security tool as necessary.

    Cryptography

    • Hash encoding verifies message integrity.
    • Asymmetric encryption relies on two keys, with public key available.
    • Symmetric encryption uses a single key.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Chapter 13: Security PDF

    Description

    Explore the various threats to computer security, including malware and common attack methods such as TCP/IP attacks and social engineering tactics. This chapter also outlines the importance of security policies and troubleshooting steps necessary for protecting networks and data. Dive into the critical measures needed to ensure wireless security configurations are in place.

    More Like This

    Network Threats and Attacks Quiz
    10 questions
    Cyber Attacks and Threats
    25 questions
    Cyber Attacks and Threats
    30 questions
    Botnets and Cybersecurity Threats
    5 questions
    Use Quizgecko on...
    Browser
    Browser