2D Flashcards

1
Q

The Basic Input/Output System (BIOS) chip in a computer holds code that interfaces with the hardware. Within the BIOS, the complementary metal–oxide–semiconductor (CMOS) setup
program determines what storage device to boot the system from. An attacker can insert a disc into the optical drive and boot into another operating system (OS), bypassing the system’s normal
OS security controls. Best security practice is to disable ___ from everything but the primary storage drive. To protect the CMOS itself, you can consider enabling a bootup ____ which would be required before getting to the OS.

A

booting
password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ ___ has the system digitally sign bootup files. Only digitally signed bootup files will run. This process prevents someone from booting up a different operating system to gain access.

A

Secure boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Universal Serial Bus (USB) flash drives and external hard drives are an easy way to store and carry information between computer systems. Because this can lead to data theft the organization’s
security policy should…?

A

specify what data may be stored on them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worms can infect a flash drive on a user’s home computer and then infect a work computer by being plugged in. USB data ports can be ____ to prevent these threats, and they are ____ on DoD computers.

A

disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardware devices are investments and need to be protected from theft. Hardware that needs to be protected includes but is not limited to…?

A

laptops, switches, routers, monitors, removable storage drivers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Facilities should be protected through facility protection measures that limit…?

A

physical access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Routers, switches, and servers should be stored in secured communications rooms or…?

A

server rooms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Portable devices can be secured with ___ ___ and secured to desks.

A

lockdown cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Removable media and removable drives should be stored in a…?

A

locked safe, cabinet or drawer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Device encryption, or hardware encryption, applies very complex encryption more quickly than ___ ___.

A

software encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware encryption is done using chips ___ installed in the system.

A

physically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two types of encryption?

A
  1. Full Disk Encryption
  2. Storage Device Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The following describes which type of encryption?

An entire hard disk drive can be encrypted using ___ ___ ___ in case of theft or loss. In the Windows 7 OS or higher, BitLocker performs this ___ ___ ___ function, including the entire contents of the disk drive to include the OS. Without the BitLocker key the system cannot boot.

A

Full Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The following describes which type of encryption?

Permanent and removable storage devices such as hard drives and USB drives can and should be encrypted.

A

Storage Device Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two kinds of FDE encryption?

A

Trusted Platform Module (TPM)
Hardware Security Module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The following describes which kind of FDE encryption?

When using FDE, a ___ stores cryptographic keys used to encrypt the data. On Windows-based OS’s, BitLocker utilizes ___.

A

TPM

17
Q

What does TPM stand for?

A

Trusted Platform Module

18
Q

What does HSM stand for?

A

Hardware Security Module

19
Q

What does FDE stand for?

A

Full Disk Encryption

20
Q

The following describes which kind of FDE encryption?

Cryptographic processors can also be stored on a separate card that can be installed on a system. The ___ is an add-on device.

A

HSM

21
Q

What does NIDS stand for?

A

Network Intrusion Detection System

22
Q

___ is required for monitoring activity on multiple systems.

A

NIDS

23
Q

A NIDS can be installed as its ___ ___ ___ or as software on a system.

A

own network device

24
Q

Either way, the ___ analyzes all traffic that travels across the network. The ___ analyzes the network traffic and looks for suspicious activity, logs the details of the activity, and sends out an administrative alert.

A

NIDS

25
Q

NIDS is made up of what components?

A
  1. Sensor
  2. Analysis Engine
  3. Console
26
Q

The following describes which component of NIDS?

A ___ is a piece of software or hardware that is placed on each network segment and is responsible for collecting traffic from that segment and then forwarding the traffic to the analysis engine, or to a collector if your infrastructure has one. The collector will collect all traffic from the ___ and send them to the analysis engine.

A

Sensor

27
Q

The following describes which component of NIDS?

The ___ ___ is responsible for receiving packets from the sensor or collector and then performing the analysis on the packets to determine if they are suspicious.

A

Analysis Engine

28
Q

The following describes which component of NIDS?

The ___ is where alerts and notifications are typically sent to. The administrator configures the NIDS from the ___.

A

Console