A+ Guide to IT Technical Support Chapter 18 Study Guide

Description

A+ Guide to IT Technical Support Chapter 18 Study GuideA+ Guide to IT Technical Support Chapter 18 Study GuideA+ Guide to IT Technical Support Chapter 18 Study GuideA+ Guide to IT Technical Support Chapter 18 Study GuideA+ Guide to IT Technical Support Chapter 18 Study GuideA+ Guide to IT Technical Support Chapter 18 Study GuideA+ Guide to IT Technical Support Chapter 18 Study GuideA+ Guide to IT Technical Support Chapter 18 Study GuideA+ Guide to IT Technical Support Chapter 18 Study GuideA+ Gu
Dakota Johnson
Flashcards by Dakota Johnson, updated more than 1 year ago
Dakota Johnson
Created by Dakota Johnson about 5 years ago
26
0

Resource summary

Question Answer
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is known by what term? Chain of Custody
Software installed on a computer that produces pop-up ads using your browser Adware
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? rootkit
You should beware of a person attempting to use your computer after you step away from it, a term referred to as... tailgating
A program that is potentially harmful or unwanted grayware
What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software? Copyright
What command can be used to take full access of a file? icacls
CryptoLocker is an example of what type of malware? ransomware
What keystroke should you press to get a logon window if you don't use the welcome screen? ctrl+alt+del
A person that secretly peeks at your monitor screen while you work may be doing what? Shoulder Surfing
Using a PIN or password in addition to TPM is an example of what type of authentication? multifactor
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild? malware signatures
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using what? The bios
Type of spyware that tracks your keystrokes, including passwords keylogger
What does the guest account in windows 7 have? administrative access
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? smart card
A type of malware that tricks you into opening it by substituting itself for a legitimate program. trojan
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive? degausser
The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer. social engineering
What does the presence of the Cydia app on an iOS device indicate? The device has been jailbroken
An attack that can be used to crack a long password by trying words and word combinations. dictionary attack
A code used to identify and authenticate a person or organization sending data over a network. digital certificate
Is the guest account disabled or enabled by default? disabled
A computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge zombie
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? TPM Chip on the Mobo
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? man in the middle
What technology can be used to locate a device such as a laptop after it has been stolen? lojack
An infestation designed to copy itself repeatedly to memory, on drive space, or on a network. worm
Show full summary Hide full summary

Similar

Abstraction
Shannon Anderson-Rush
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
LAN and WAN
Nathan Roberts
Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Project Communications Management
farzanajeffri
Common Technology Terms
Julio Aldine Branch-HCPL
Design Patterns
Erica Solum