2D Flashcards
The Basic Input/Output System (BIOS) chip in a computer holds code that interfaces with the hardware. Within the BIOS, the complementary metal–oxide–semiconductor (CMOS) setup
program determines what storage device to boot the system from. An attacker can insert a disc into the optical drive and boot into another operating system (OS), bypassing the system’s normal
OS security controls. Best security practice is to disable ___ from everything but the primary storage drive. To protect the CMOS itself, you can consider enabling a bootup ____ which would be required before getting to the OS.
booting
password
___ ___ has the system digitally sign bootup files. Only digitally signed bootup files will run. This process prevents someone from booting up a different operating system to gain access.
Secure boot
Universal Serial Bus (USB) flash drives and external hard drives are an easy way to store and carry information between computer systems. Because this can lead to data theft the organization’s
security policy should…?
specify what data may be stored on them
Worms can infect a flash drive on a user’s home computer and then infect a work computer by being plugged in. USB data ports can be ____ to prevent these threats, and they are ____ on DoD computers.
disabled
Hardware devices are investments and need to be protected from theft. Hardware that needs to be protected includes but is not limited to…?
laptops, switches, routers, monitors, removable storage drivers, etc.
Facilities should be protected through facility protection measures that limit…?
physical access
Routers, switches, and servers should be stored in secured communications rooms or…?
server rooms
Portable devices can be secured with ___ ___ and secured to desks.
lockdown cables
Removable media and removable drives should be stored in a…?
locked safe, cabinet or drawer
Device encryption, or hardware encryption, applies very complex encryption more quickly than ___ ___.
software encryption
Hardware encryption is done using chips ___ installed in the system.
physically
What are the two types of encryption?
- Full Disk Encryption
- Storage Device Encryption
The following describes which type of encryption?
An entire hard disk drive can be encrypted using ___ ___ ___ in case of theft or loss. In the Windows 7 OS or higher, BitLocker performs this ___ ___ ___ function, including the entire contents of the disk drive to include the OS. Without the BitLocker key the system cannot boot.
Full Disk Encryption
The following describes which type of encryption?
Permanent and removable storage devices such as hard drives and USB drives can and should be encrypted.
Storage Device Encryption
What are the two kinds of FDE encryption?
Trusted Platform Module (TPM)
Hardware Security Module (HSM)