Term
What three areas does Social Engineering deal with? |
|
Definition
Infiltration Telephone Scams Phishing |
|
|
Term
What four areas does Access Control Deal with? |
|
Definition
Physical Security Authentication Users and Groups Security Policies |
|
|
Term
What is the shortcut keys for locking your computer in all versions of Windows? |
|
Definition
|
|
Term
Use this command at the command prompt to go from FAT to NTFS. |
|
Definition
|
|
Term
What would you put after the CONVERT command to see all available options? |
|
Definition
|
|
Term
What are the three sections of the event viewer? |
|
Definition
Application Security System |
|
|
Term
The act of telling Windows to crate an entry in the Security Log when certain events happen. |
|
Definition
|
|
Term
What are the 5 types of Malware that can be on your computer? |
|
Definition
Grayware Spam Viruses Trojan Horses Worms |
|
|
Term
What are the two highly recommended spyware removal programs? |
|
Definition
Lavasoft's Ad-Aware PepiMKs Spybot Search and Destroy |
|
|
Term
What are the 5 steps for dealing with a virus. |
|
Definition
Recognize Quarantine Search and Destroy Remediate Educate |
|
|
Term
These two commands can be used to repair boot sectors. |
|
Definition
|
|
Term
This command is used to rebuild a corrupted BOOT.INI file. |
|
Definition
|
|
Term
This command is used to help grab replacement files. |
|
Definition
|
|