13.2 Flashcards

1
Q

Baseline Configuration Purpose

A

Maintain consistent level of security; Help mitigate flaws and security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Causes of Privilege Escalation

A

Error by administrator; weak passwords; bad coding in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Baseline Accounts

A

Minimum 2 accounts; administrator and user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 Security Baseline Settings

A
  1. Minimum Password Length
  2. Account lockout duration
  3. Disabling unnecessary services
  4. “Allow administration by” option
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Remote Access Trojan

A

A remote access Trojan provides full or partial access to the victim’s system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Sending Trojan

A

This type sends data such as key strokes, passwords, or cookies to the attacker via email or a back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Destructive Trojan

A

These types cause havoc like deleting files, corrupting the OS, or crashing the entire system. Usually the purpose is to disable an antivirus or firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Proxy Trojans

A

This sort of Trojan is used as a jumping point for an attack on another system in order to mask the attacker’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Goal of Denial of Service

A

Deny legitimate users from accessing information or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Signs of DoS

A

unusually slow network
unavailability of particular website
dramatic increase of spam mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Session Hijacking

A

Exploits the session between devices; must be on the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Session Hijacking Prevention

A

Encryption, Secure Protocols, Limit Incoming Connections, Minimize Remote Access, Strong Authentication, Using Switches instead of Hubs, User Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly