Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ITC 191

Week 11 (14.07 - 14.11)

QuestionAnswer
While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches that you have performed. Which of the following is this an example of? Adware
Which of the following are the most common means of virus distribution? Malicious websites; Email
Which of the following describes spyware? it monitors the actions you take on your machine and sends the information back to the originating source
Anna, a user downloaded a free PDF editing application from the internet. Now her laptop constantly displays desktop pop-ups, and several applications don't start. Which of the following types of malware was Anna the victim of? Trojan
Which of the following is a program that appears to be legitimate application, utility, game, or screen saver, but performs malicious activties surrepitiously? Trojan horse
You are troubleshooting a malware infection. As part of the remediation process, you have used a USB drive to boot into a lightweight version of Windows. Which of the following did you MOST likely boot into? WinPE
You have been tasked with removing malware from an infected system. You have confirmed there is an infection, and you continue running scans and removing the malware, but every time the system is rebooted, the malware comes back. Which of the following sh Disable Windows System Restore
Which of the following should you do FIRST when you suspect a malware infection? Investigate and verify the malware symptoms
Which of the following should you do immediately after a malware infection is confirmed? Quarantine the infected system
After a malware infection has been fully remediated, you should re-enable System Restore and run a full system backup. Which of the following is the BEST place to save this backup? On an external drive
Which of the following provides a set of rules that specify which types of network traffic are allowed through a firewall? ACL
For some time now, you have been using an application on your Windows 11 computer at home and while in the office. This application communicates with the internet. Today, your team lead decides to have a special team meeting at a local hotel. During th Firewall & security
Which of the following is a firewall type that scans network traffic based on TCP or UDP transmission? Circuit-layer gateway
You are trying to connect from outside the company network to a server inside the company network using RDP (Remote Desktop Connection). However, the connection is failing. Which network device does your network administrator MOST likely need to config Firewall
In which of the following situations should you install a firewall? You want to restrict internet users from accessing private data on your network
You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. Which of the following is the BEST solution to your problem? Open the firewall port for the Remote Desktop protocol
Which of the following is a type of firewall? Packet filtering
Which of the following keeps track of various network devices while ensuring that the software is secure? Endpoint management server
A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria and be cost effective: No one from the intern Implement an all-in-one UTM security appliance
Which of the following all-in-one security appliance (UTM) functions detects intrusions and alerts the network but does not block traffic? Intrusion detection
Which of the following proxy server roles stores frequently accesses data so that a user's request never has to leave the network for retrieval? Caching
You want to configure a Windows workstation with your network proxy server's IP address from Control Panel using the Internet Properties window. Click on the tab in the Internet Properties window that you would use to do this. Connections
You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria? Install a proxy server allow internet access only through the proxy server
As a network administrator for your company, you want to set up a network device that manages traffic leaving and entering your network from the outside. Which of the following would BEST meet your requirements? Forward proxy server
Two employees are unable to access any websites on the internet, but they can still access server s on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. Which of the following actions woul Identify the proxy server name and port number in Internet Options
An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service? Proxy server
Which of the following functions are performed by proxy servers? Block employees from accessing certain websites; Cache web pages
You connect your computer to a wireless network available at the local library. You find that you cannot access several websites on the internet. Which of the following is the MOST likely cause of this problem? A proxy server is filtering access to websites
As a network administrator for your company, you want to set up a network device that manages internal traffic between servers and clients. Which of the following would BEST meet your requirements? Reverse proxy server
Which of the following proxy server roles allows users to connect to the internet anonymously with their dat encrypted during the transmission? VPN
Which of the following is a risk associated with using a web browser password manager? Signing in with the browser password gives a hacker control over all passwords stored on the browser
What is issued to a website in order for it to be validated as a trusted website? Certificate authority
You want to set up a service on your company network that can be configured with a list of valid websites. The services should give employees a certificate warning if they try to visit a version of an untrusted site. Which of the following services is de DNS server
Which of the following password manager features converts a password into a jumbled string of symbols and letter before storing it in the account? Hashing
You have logged into your banking website using a password, but now the website indicates that it sent you an email with a confirmation code that you need to retrieve and enter before you can continue to access the website. Which of the following secur Two-factor authentication
Which of the following is an issue with using adblocker extension on your web browser? It can cause certain sites and browsers to no longer work on specific web pages
You have just created an account for your web browser, and you want to be able to access the bookmarks you create on your home laptop with the same web browser on your company workstation. Which of the following can you use to make these bookmarks acce Browser synchronization
While browsing the internet, you notice that browser performance is continually slowing down. Which of the following would MOST likely increase performance of your web browser? Clear the data cache
While browsing the internet, you are constantly being bombarded by small advertisements with links attached to the web page. Which of the following can you use to prevent these advertisments from appearing? Pop-up blocker
While browsing the internet, you want to make sure that the browser you are using does not store your search history, cookies, or password information. Which of the following can you enable to prevent this from happening? Private Browsing Mode
Which of the following are likely symptoms of a malware infection? Changed file permission; Renamed system files
Which of the following are the first settings you should check if you suspect that a malware attack has impacted your internet connection? DNS settings; proxy settings
You are an IT technician for your company. Vivian, an employee, has been receiving error messages, indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Short Disconnect Vivian's computer from the network
While browsing the internet, a pop-up window comes up, warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the BEST next actions to take? Run a full system scan using the anti-malware software installed on your system; Update the virus definitions for your locally installed anti-malware software
An employee calls to complain that their browser keeps opening up to a strange search engine page, and a toolbar has been added to their browser. Which of the following malware issues are MSOT likely causing the problem? Software issues
Which type of file is commonly used by trusted websites to create installation software for mobile devices? APK files
Which of the following are common symptoms of a compromised mobile device? Increased data usage; connectivity issues
Your company is creating a financial application that you want to first test on mobile devices. Several customers have asked to be part of the beta testing process. What do the employees need to do on their mobile devices in order to be able to partici Turn on Developer Mode
You have just visited a website on your mobile device when your web browser locks up, and you receive a warning that your device has a virus. You are given a phone number to call to remove the virus. Which of the following describes the type of malware False security warning
Which mobile device vulnerability results in a user unlocking all of a mobile device's features and capabilities? Jailbreaking
Created by: rparticka
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards