Professional Documents
Culture Documents
Curriculum Section
Curriculum Section
Curriculum Section
9.2.1 15. Computer viruses are deliberately Created and sent out by attackers
16. A virus is a program written with Malicious intent and send out by attacker
17. The virus is transferred to another E-mail, file transfers, and instant messaging.
computer through
18. How does a virus work? A virus has the potential to corrupt or even delete files on
your computer, use your e-mail to spread itself to other
computers, or even erase your entire hard drive
19. The most damaging type of virus is used Record keystrokes
to
20. That allows these viruses to be used by Passwords or credit card numbers
IT Essentials Module 9 Fundamentals of Security Study Guide
attackers to harvest sensitive information,
such as
21. A worm is a A self-replicating program
22. How is a worm different from a virus? It does not need to attach to a program to infect a
computer
23. Even if the worm does not damage data It consumes the bandwidth
or applications on the hosts it infects, it is
harmful to networks because it
24. A Trojan threat is hidden in software that Pretends to be a useful program
25. Trojans are often disguised as Useful programs
44. Basic precautions to help protect against Never give out your password.
social engineering: Always ask for the ID of unknown persons.
Restrict access of unexpected visitors.
Escort all visitors.
Never post your password in your work area.
Lock your computer when you leave your desk.
Do not let anyone follow you through a door that
requires an access card.
53. The only way to fully ensure that data Carefully shatter the platters with a hammer and safely
cannot be recovered from a hard drive is to dispose of the pieces
54. Media like CDs and floppy disks must Shredding machine designed for this task
also be destroyed. Use a
9.3 55. A security plan should be used to What should be done in a critical situation
determine
56. Part of the process of ensuring security is Determine areas that are weak
to conduct tests to
9.3.1 57. Though local security policies may vary What assets require protection?
between organizations, there are questions all What are the possible threats?
organizations should ask: What to do in the event of a security breach?
9.3.3 61. The value of physical equipment is often Value of the data it contains
far less than the
65. List Password rules: Passwords should expire after a specific period of
time.
Passwords should contain a mixture of letters and
numbers so that they cannot easily be broken.
Password standards should prevent users from writing
down passwords and exposing them to public view.
Rules about password expiration and lockout should
be defined. Lockout rules apply when an unsuccessful
attempt has been made to access the system or when
a specific change has been detected in the system
configuration.
73. A technician needs to know how to To know how to configure access points and wireless
NICs to an appropriate level of security