1.3 Threat Management Flashcards
what is the most secure implementation of file transfer protocol (FTP)?
secure file transfer protocol (SFTP)
what is the name for a hole in the security of an application deliberately left in place by a designer?
backdoor
which malicious software infects a system without relying upon other applications for its execution?
a worm
what does an anti-virus application signature file contain?
it contains identifying information about viruses
which application or services uses TCP/UDP port 3389?
remote desktop protocol (RDP)
which port number is used by TFTP?
UDP port 69
what is the name for a fix that addresses a specific windows system problem or set of problems?
hotfix
which firewall port should you enable to allow SMTP trafic to flow through the firewall?
port 25
how many TCP/UDP ports are vulnerable to malicious attacks?
65,536
which type of virus can change its signature to avoid detection?
polymorphic
what is the default PPTP port?
TCP port 1723
what is the purpose of NAC?
network access control (NAC) ensures that the computer on the network meets an organization’s security policies
using role-based access control (RBAC), which entities are assigned roles?
users or subjects
what is the name of the area that connects to a firewall and offers services to untrusted networks?
DMZ
which virus creates many variants by modifying its code to deceive antivirus scanners?
polymorphic virus
which port should you block at your network firewall to prevent telnet access?
port 23
what is a good solution if you need to separate two departments into separate networks?
VLAN segregation
which port number does LDAP use for communications encrypted using SSL/TLS?
port 636
which type of code performs malicious acts only when a certain set of conditions occurs?
a logic bomb
which firewall port should you enable to allow IMAP4 traffic to flow through the firewall?
TCP port 143
which two port does FTP use?
ports 20 and 21
what does VLAN segregation accomplish?
it protects each individual segment by isolating the segments
which port number does HTTP use?
port 80
which port numbers are used by NetBIOS?
ports 137, 138, 139
which type of malware appears to perform a valuable function, but actually performs malicious acts?
trojan horse
which port number does LDAP use when communications are not secured using SSL/TLS?
port 389
what does the acronym RBAC denote?
role-based access control
which viruses are written in macro language and typically infect operating systems?
macro viruses
who can change a resource’s category in a mandatory access control environment?
administrators only
which port number does NNTP (network news transfer protocol) use?
TCP port 119
what is a trojan horse?
malware that is disguised as a useful utility, but is embedded with a malicious code to infect computer systems
which port number does NTP use?
port 123
what does the acronym DAC denote?
discretionary access control
which firewall port should you enable to allow POP3 traffic to flow through the firewall?
TCP port 110
which port number does DHCP use?
port 67
which port number is used by SSL, FTPS, and HTTPS?
TCP port 443
which port number is used by SSH, SCP, and SFTP?
port 22
what is the default L2TP port?
UDP port 1701
which type of access control associates roles with each user?
role-based access control (RBAC)
why should you install a software firewall and the latest software patches and hotfixes on your computer?
to reduce security risks
what is the name for a collection of hotfixes that have been combined into a single patch?
a service pack
which type of access control is the multi-level security mechanism used by the department of defense (DoD)?
mandatory access control (MAC)
which port number does DNS use?
port 53
which port number is used by SMB?
tcp port 445
what is a file considered in a mandatory access control environment?
an object
what is the purpose of anti-spam application or filters?
to prevent unsolicited e-mail
which type of access control was originally developed for military use?
mandatory access control (MAC)
when should you install a software patch on a production server?
after the patch has been tested
which type of access control is most suitable for top-secret information?
mandatory access control (MAC)
which port number does SNMP use?
UDP port 161
in a secure network, what should be the default permission position?
implicit deny
which port number does SSH use?
port 22
which type of virus attempts to hide from antivirus software and from the operating system by remaining in memory?
stealth
which port is used for LDAP authentication?
port 389
which self-replicating computer program sends copies of itself to other devices on the network?
worm
which port number is used by microsoft SQL server?
tcp port 1433
which TCP port number does secure sockets layer (SSL) use?
port 443