Deck 2: Computer Security Basics

ملء الشاشة (f)
exit full mode
سؤال
Combine this technology with a firewall for a very safe way to connect two private networks over the Internet.

A)proxy service
B)DMZ
C)firewall
D)VPN
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Also called an application-layer gateway, this software will watch for application-specific traffic, acting as a stand-in for internal computers.

A)proxy service
B)DMZ
C)firewall
D)VPN
سؤال
This method of malware infection installs malware through use of a separate browser window that opens uninvited from a Web page. If you click within the window, you may unknowingly agree to install malware.

A)rootkit
B)pop-up download
C)drive-by download
D)hoax
سؤال
What type of malware collects information about the user's browsing habits in order to display advertisements targeted to that user?

A)zero-day exploit
B)browser hijacking
C)adware
D)worm
سؤال
What term describes a group of networked computers infected with malware that forward information to other computers?

A)Trojan horse
B)worm
C)botnet
D)zombie
سؤال
What term describes malware that takes advantage of a vulnerability in an operating system or application that is unknown to the publisher, leaving systems using that software vulnerable until the vulnerability is detected and patched?

A)zero-day exploit
B)browser hijacking
C)spim
D)bluesnarfing
سؤال
What type of malware replicates itself on a computer or throughout a network?

A)zero-day exploit
B)worm
C)botnet
D)zombie
سؤال
Once installed, this type of malware becomes a vector giving other malware administrative access to a computer.

A)rootkit
B)pop-up download
C)drive-by download
D)hoax
سؤال
You receive an e-mail message from a friend claiming that she is in another country, in trouble, and urgently needs money wired to her. You call the friend and discover that she is safe at home and did not know about the message. This scenario is an example of a/an ________.

A)spam
B)browser hijacking
C)hoax
D)war driving
سؤال
What term is used for a computer that belongs to a group of networked computers, all working mindlessly to serve the person who installed the program on the computers?

A)Trojan horse
B)worm
C)botnet
D)zombie
سؤال
What term describes a password cracker that tries a huge number of possible passwords?

A)keylogger
B)cracker
C)zombie
D)brute-force
سؤال
What type of threat points your browser's home page to a website you did not chose, and may even keep you from changing the browser's default home page?

A)bluesnarfing
B)phishing
C)browser hijacking
D)key logging
سؤال
An email containing enticements (often appealing to human weaknesses)to open attachments is a form of what type of threat?

A)phishing
B)hoax
C)social engineering
D)worm
سؤال
What type of malware is also a vector and gets its name from Virgil's famous epic poem, The Aeneid, which described how Greek warriors gained access to the City of Troy?

A)botnet
B)Trojan horse
C)backdoor
D)DMZ
سؤال
What term describes unsolicited instant messages?

A)spam
B)browser hijacking
C)phishing
D)spim
سؤال
It is a good idea to install or enable one of these on your computer, even if your network has similar protection between it and other networks.

A)Administrator
B)secret key
C)DMZ
D)personal firewall
سؤال
This type of software protects against unsolicited e-mail, filtering out those that have certain characteristics.

A)antivirus
B)spam filter
C)firewall
D)proxy service
سؤال
What is the generic term for a mode or method of malware infection?

A)firewall
B)virus
C)DMZ
D)vector
سؤال
This software or hardware device examines network traffic and allows or rejects traffic into a network or computer based on predefined rules.

A)proxy service
B)DMZ
C)firewall
D)VPN
سؤال
What is the oldest malware vector?

A)sneakernet
B)back door
C)war driving
D)bluesnarfing
سؤال
A Windows computer that is a member of a domain will have a local account named Administrator that you can access when your computer starts up in Safe Mode.
سؤال
Windows EFS encrypts entire drives.
سؤال
Your computer has been showing signs of a malware infection, and it started up in Safe Mode. Because your computer is not a member of an Active Directory domain, what powerful built-in account can you log on with to try to resolve the problem?

A)Guest
B)standard user
C)root
D)Administrator
سؤال
What type of security software can you use to both protect from malware infections and to scan disk space and RAM looking for installed malware?

A)antivirus
B)anti-spam
C)firewall
D)proxy service
سؤال
HTTPS uses a private key to encrypt data between a client and an e-commerce server.
سؤال
You must use data wiping software on a hard drive before installing a new operating system.
سؤال
When you access a Web page to pay for an online purchase, it should show HTTPS as the protocol in the address line.
سؤال
Which of the following is among the symptoms of a possible malware infection?

A)adware
B)unsolicited e-mail
C)sudden computer slowdown
D)an error message when you enter your password
سؤال
Cookies are always a threat.
سؤال
Use this feature of your Microsoft account to group together other accounts as family and protect children via activity reporting, screen time limits, and content restrictions.

A)content filtering
B)Microsoft Family
C)certificates
D)cookies
سؤال
After several failed attempts to log on/sign in to your Windows computer you see a message stating that your account has been locked out. What caused this problem?

A)Wrong password
B)Too many failed attempts
C)Wrong username
D)Incorrect version of Windows
سؤال
This special file holds a secret key.

A)cookie
B)token
C)vector
D)digital certificate
سؤال
FileVault is a data encryption feature in macOS.
سؤال
Use this type of program to guard against an especially annoying type of adware that appears in your browser and blocks the content you want to see.

A)pop-up blocker
B)antivirus
C)spam filter
D)content filter
سؤال
FileVault, a feature of some editions of Windows, allows you to encrypt an entire drive.
سؤال
We recommend that you block first-party cookies and allow third-party cookies.
سؤال
You attempt to install software in Windows; and although you are logged on with a computer administrator type of account, your screen turns grey and you receive a message asking if you want to allow the program to make changes to the computer. What Windows feature is at work here?

A)HTTPS
B)UAC
C)EFS
D)authentication
سؤال
A set of these should exist in both document form and software form for any organization.

A)cookies
B)account lockout policy
C)anti-spyware
D)security policies
سؤال
Windows will warn you if you try to log on with the Caps Lock key turned on.
سؤال
If your private network has both client computers needing Internet access and servers that must be available from the Internet, you should create this separate network for those servers in order to keep Internet-initiated traffic from entering the network containing your client computers. What is the term for the network where the servers are located?

A)back door
B)DMZ
C)botnet
D)firewall
سؤال
Provide at least two common symptoms of a malware infection.
سؤال
Briefly define the security tool known as a honey pot.
سؤال
Describe at least two symptoms that can mean that you are the victim of identity theft.
سؤال
What does the term "malware" stand for?
سؤال
Define EFS.
سؤال
What should you do before donating an old computer to your favorite charity?
سؤال
After encrypting a file using the Windows Encrypting File System (EFS)you move the file to another NTFS-formatted volume. Is the file still encrypted? Explain your answer.
سؤال
After typing in your password, you are greeted with an error message indicating that your user name or password is incorrect. What should you check before attempting to enter it again?
سؤال
Briefly describe what you should do if you suspect that malware has infected your computer.
سؤال
You believe your computer is infected by malware, but you have not kept your security software up-to-date. How can you quickly run an up-to-date scan for malware, providing you have an Internet connection?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Computer Security Basics
1
Combine this technology with a firewall for a very safe way to connect two private networks over the Internet.

A)proxy service
B)DMZ
C)firewall
D)VPN
D
2
Also called an application-layer gateway, this software will watch for application-specific traffic, acting as a stand-in for internal computers.

A)proxy service
B)DMZ
C)firewall
D)VPN
A
3
This method of malware infection installs malware through use of a separate browser window that opens uninvited from a Web page. If you click within the window, you may unknowingly agree to install malware.

A)rootkit
B)pop-up download
C)drive-by download
D)hoax
B
4
What type of malware collects information about the user's browsing habits in order to display advertisements targeted to that user?

A)zero-day exploit
B)browser hijacking
C)adware
D)worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
What term describes a group of networked computers infected with malware that forward information to other computers?

A)Trojan horse
B)worm
C)botnet
D)zombie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What term describes malware that takes advantage of a vulnerability in an operating system or application that is unknown to the publisher, leaving systems using that software vulnerable until the vulnerability is detected and patched?

A)zero-day exploit
B)browser hijacking
C)spim
D)bluesnarfing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
What type of malware replicates itself on a computer or throughout a network?

A)zero-day exploit
B)worm
C)botnet
D)zombie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Once installed, this type of malware becomes a vector giving other malware administrative access to a computer.

A)rootkit
B)pop-up download
C)drive-by download
D)hoax
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
You receive an e-mail message from a friend claiming that she is in another country, in trouble, and urgently needs money wired to her. You call the friend and discover that she is safe at home and did not know about the message. This scenario is an example of a/an ________.

A)spam
B)browser hijacking
C)hoax
D)war driving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
What term is used for a computer that belongs to a group of networked computers, all working mindlessly to serve the person who installed the program on the computers?

A)Trojan horse
B)worm
C)botnet
D)zombie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
What term describes a password cracker that tries a huge number of possible passwords?

A)keylogger
B)cracker
C)zombie
D)brute-force
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
What type of threat points your browser's home page to a website you did not chose, and may even keep you from changing the browser's default home page?

A)bluesnarfing
B)phishing
C)browser hijacking
D)key logging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
An email containing enticements (often appealing to human weaknesses)to open attachments is a form of what type of threat?

A)phishing
B)hoax
C)social engineering
D)worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
What type of malware is also a vector and gets its name from Virgil's famous epic poem, The Aeneid, which described how Greek warriors gained access to the City of Troy?

A)botnet
B)Trojan horse
C)backdoor
D)DMZ
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
What term describes unsolicited instant messages?

A)spam
B)browser hijacking
C)phishing
D)spim
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
It is a good idea to install or enable one of these on your computer, even if your network has similar protection between it and other networks.

A)Administrator
B)secret key
C)DMZ
D)personal firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
This type of software protects against unsolicited e-mail, filtering out those that have certain characteristics.

A)antivirus
B)spam filter
C)firewall
D)proxy service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is the generic term for a mode or method of malware infection?

A)firewall
B)virus
C)DMZ
D)vector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
This software or hardware device examines network traffic and allows or rejects traffic into a network or computer based on predefined rules.

A)proxy service
B)DMZ
C)firewall
D)VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
What is the oldest malware vector?

A)sneakernet
B)back door
C)war driving
D)bluesnarfing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
A Windows computer that is a member of a domain will have a local account named Administrator that you can access when your computer starts up in Safe Mode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Windows EFS encrypts entire drives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Your computer has been showing signs of a malware infection, and it started up in Safe Mode. Because your computer is not a member of an Active Directory domain, what powerful built-in account can you log on with to try to resolve the problem?

A)Guest
B)standard user
C)root
D)Administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
What type of security software can you use to both protect from malware infections and to scan disk space and RAM looking for installed malware?

A)antivirus
B)anti-spam
C)firewall
D)proxy service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
HTTPS uses a private key to encrypt data between a client and an e-commerce server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
You must use data wiping software on a hard drive before installing a new operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
When you access a Web page to pay for an online purchase, it should show HTTPS as the protocol in the address line.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is among the symptoms of a possible malware infection?

A)adware
B)unsolicited e-mail
C)sudden computer slowdown
D)an error message when you enter your password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Cookies are always a threat.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Use this feature of your Microsoft account to group together other accounts as family and protect children via activity reporting, screen time limits, and content restrictions.

A)content filtering
B)Microsoft Family
C)certificates
D)cookies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
After several failed attempts to log on/sign in to your Windows computer you see a message stating that your account has been locked out. What caused this problem?

A)Wrong password
B)Too many failed attempts
C)Wrong username
D)Incorrect version of Windows
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
This special file holds a secret key.

A)cookie
B)token
C)vector
D)digital certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
FileVault is a data encryption feature in macOS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Use this type of program to guard against an especially annoying type of adware that appears in your browser and blocks the content you want to see.

A)pop-up blocker
B)antivirus
C)spam filter
D)content filter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
FileVault, a feature of some editions of Windows, allows you to encrypt an entire drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
We recommend that you block first-party cookies and allow third-party cookies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
You attempt to install software in Windows; and although you are logged on with a computer administrator type of account, your screen turns grey and you receive a message asking if you want to allow the program to make changes to the computer. What Windows feature is at work here?

A)HTTPS
B)UAC
C)EFS
D)authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
A set of these should exist in both document form and software form for any organization.

A)cookies
B)account lockout policy
C)anti-spyware
D)security policies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Windows will warn you if you try to log on with the Caps Lock key turned on.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
If your private network has both client computers needing Internet access and servers that must be available from the Internet, you should create this separate network for those servers in order to keep Internet-initiated traffic from entering the network containing your client computers. What is the term for the network where the servers are located?

A)back door
B)DMZ
C)botnet
D)firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Provide at least two common symptoms of a malware infection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Briefly define the security tool known as a honey pot.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe at least two symptoms that can mean that you are the victim of identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What does the term "malware" stand for?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Define EFS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What should you do before donating an old computer to your favorite charity?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
After encrypting a file using the Windows Encrypting File System (EFS)you move the file to another NTFS-formatted volume. Is the file still encrypted? Explain your answer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
After typing in your password, you are greeted with an error message indicating that your user name or password is incorrect. What should you check before attempting to enter it again?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Briefly describe what you should do if you suspect that malware has infected your computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
You believe your computer is infected by malware, but you have not kept your security software up-to-date. How can you quickly run an up-to-date scan for malware, providing you have an Internet connection?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.