Security Fundamentals 98-367: Lesson 5
Terms in this set (48)
Which type of malware copies itself onto other computers without the owner's consent and will often delete or corrupt files?
Which type of malware collects personal information or browsing history, often without the user's knowledge
Your computer has been infected with malware
Your computer seems to be slow, and you notice that you have a different default web page than usual. What is most likely the cause of the problems?
keep your machine up to date with the latest security patches
Besides installing an antivirus software package, you should always _____ to protect your computer against malware.
A thoroughly tested, cumulative set of hotfixes and other patches is known as a(n):
What technology is used by Windows to prevent unauthorized changes to your system?
Changing the data and time
When using UAC, which of the following requires administrative permissions or rights?
What mechanism is working when you try to change a computer's display settings and you get a pop-up asking whether you wish to continue?
What host-based firewall software comes with the current versions of Windows?
Windows with Advanced Security
What program would you use to configure IPsec on a computer running Windows Server 2008?
encrypt the offline files
If you have sensitive or confidential information stored in your offline files, it is recommended that you:
Add the address or domain for these emails to the white list
You determine that legitimate emails are being blocked by your spam-blocking device. What should you do?
SMTP uses TCP port:
How many content zones are there in Internet Explorer?
Say that you receive an email stating that your account has just expired and asking you to log in to a legitimate-looking website to fix the problem. This is most likely an instance of:
Malicious software (malware)
_____ is software that is designed to infiltrate or infect a computer, usually with ill intent.
A(n) _____ is a self-replicating program that copies itself to other computers while consuming network resources.
Microsoft's antispyware program is called _____.
up to date
For antivirus software to be effective, it must by kept _____.
An example of a(n) _____ is a message saying to delete the win.com file because it is a virus.
Windows Update Server (WUS)
System Center Configuration Manager
If you want to control what updates get pushed to clients within your organization, you would use _____ or ______.
_____ is when you are asked if you want to continue with an action and your desktop is dimmed and other programs are temporary halted until you approve the change.
______ is another name for junk email.
Sender Policy Framework (SPF)
_____ is an email validation system that is designed to verify that an email is coming from the proper email server.
Any software package that automatically plays, displays, or downloads advertisements to a computer after the software is installed or while the application is being used.
A program that gives someone remote, unauthorized control of a system or initiates an unauthorized task.
A special algorithm used to determine whether email is considered spam.
Zones used to define and help manage security when visiting sites.
A piece of text stored by a user's web browser. This file can be used for a wide range of purposes, including user identification, authentication, and storing site preferences and shopping cart contents.
malicious software (malware)
Software that is designed to infiltrate or affect a computer system without the owner's informed consent. The term "_____" is usually associated with viruses, worms, Trojan horses, spyware, rootkits, and dishonest adware.
Microsoft Baseline Security Analyzer (MBSA)
A software tool released by Microsoft to determine the security state of a system by assessing missing security updates and less-secure security settings withing Microsoft Windows components such as Internet Explorer, IIS web server, and products such as Microsoft SQL Server and Microsoft Office macro settings.
Copies of network files that are stored on your computer so that you can access them when you are not connected to the network or when the network folder that contains the files are not connected.
An attack aimed at redirecting a website's traffic to a bogus website.
A technique based on social engineering, where users are asked (usually through email or websites) to supply personal infromation.
A component used on web pages that can by used as part of useful website controls, but can also be used for annoying advertisements, and a few may attempt to load spyware or other malicious programs.
A software or hardware device designed to gain administrator-level control over a computer system without being detected.
Sender Policy Framework (SPF)
An email validation system designed to prevent email spam that uses source address spoofing. _____ allows administrators to specify in DNS _____ records in the public DNS which hosts are allowed to send email from a given domain.
Junk email that is usually sent unsolicited
A type of malware that is installed on a computer to collect a user's personal information or details about his or her browsing habits, often without the user's knowledge.
An executable program that appears as a desirable or useful program. Because it appears to be desirable or useful, users are tricked into loading and executing the program on their systems.
User Account Control (UAC)
A feature that started with Windows Vista and is included with Windows 7. _____ helps prevent unauthorized changes to your computer-and in doing so, it helps protect your system from malware.
A program that can copy itself and infect a computer without the user's consent or knowledge.
A message warning the recipient of a nonexistent computer virus threat, usually sent as a chain email that tells the recipient to forward it to everyone he or she knows. This is a form of social engineering that plays on people's ignorance and fear.
A software product from Microsoft that is intended to prevent, remove, and quarantine spyware in Microsoft Windows.
A software component included with Windows that can help prevent hackers or malicious software (such as worms) from gaining access to your computer through a network or the Internet. A firewall can also help stop your computer from sending malicious software to other computers.
Windows Server Update Server (WSUS)
A software system that can keep your systems updated with the newest Windows and Office updates.
Fixes, patches, service packs, and updated device drivers that should be applied to a Windows system. By adding fixes and patches, you'll keep Windows stable and secure.
A self-replicating program that copies itself to other computers on a network without any user intervention.