220-1102 Security Flashcards
What is a small room with a set of two doors, one to the outside, unsecured area and one to the inner, secure area. Also known as a mantrap.
Access Control Vestibule
What are devices that store some unique information that a user carries on their person?
Security tokens
Which device provides a one-time use code that is used to authenticate a user in addition to a username and password?
RSA Token
What is the most common RSA Token in hard token form?
Key Fob
What is a fancy term for a metal detector?
Magnetometer
What kinds of drives can support access control lists (ACLs)
Drives with modern file systems such as NTFS, APFS, HFS+, and ext3/4
What is an example of a soft token?
Authenticator application
In a Windows domain, a computer running Windows Server is configured as a what?
domain controller
What does a domain controller store?
domain accounts
What can a login script do for a domain account?
Map network drives, place an information box on the screen, run applications and more
In active directory, what enables you to organize users and computers by function, location, permission and more?
Organizational units (OUs)
What do roaming profiles in active directory provide the user?
Each time the user logs into a new machine, their home folder data can move with them
What is the difference between active directory groups, security groups, and user groups?
Active directory groups and security groups are the same term. They are more powerful and more centrally managed than user groups.
What is an interlinked area of physical and logical security that includes: physical security, authentication, users, groups, and security policies?
Access Control
What encryption standard does WPA2 use?
Advanced Encryption Standard (AES)
Which wifi security addresses usability and security issues that affected its predecessor by including encryption to protect data of users on open (public) networks?
WPA3
Which encryption method was introduced in WPA and is supported by WPA2, but lessens security?
Temporal Key Integrity Protocol (TKIP)
Which authentication protocol enables a central authorization server to pass out keys that individual clients can present to access resources as needed?
Kerberos
What is malware that replicates and activates by attaching to executable programs or the drives boot sector?
Virus
What kind of virus live inside the system’s boot partition and activate their malicious code before the security software can start?
Boot sector virus
What is it called when a virus does something like corrupting data or stealing private information?
Activation
What kind of malware does not need to attach itself to other programs to replicate?
Worm
What is a piece of malware that appears or pretends to do one thing while, at the same time, doing something evil?
Trojan
What malware logs the user’s keystrokes and makes that information available to the attacker?
Keylogger
Which malware takes advantage of very low-level operating system functions to hide itself?
Rootkit
What are the 7 steps for malware removal
- Investigate and verify malware symptoms
- Quarantine infected systems
- Disable System Restore in Windows
- Remediate infected systems
A. Update anti-malware software
B. Scanning and removal techniques - Schedule scans and run updates
- Enable System Restore and create a restore point in Windows
- Educate the end user
When attempting to remediate an infected system, what do you do if you restore from a backup and the system is still infected?
Perform a clean install