6.1 Operating System Security Flashcards

1
Q

What does address space layout randomization do?

A

A technique an OS uses to shift memory in use around so tampering with it is more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an exploit framework?

A

A collection of prepacked exploits and tools such as network mapping tools and sniffers - can be used to asses vulnerability of own network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a port scanner and a vulnerability assessment tool?

A

Scanners detects flaws in the host, ie - Nmap looks for open ports - Vulnerability tool looks for the actual network services running on the host. OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the concept of an attack surface.

A

The sum of the areas that an OS could be attacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why might you want a firewall on your host if one already exists on the network?

A

Adds an extra layer of security - will packet filter and stateful packet inspection -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is operating system hardening?

A

Configuring the OS for enhanced security; OS hardening reduces attack surface by decreasing available avenues for attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the XD bit, and why do you use it?

A

XD (Execute Disable Bit) is Intel’s version of Executable Space Protection. (AMD calls it Enhance Virus Protection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does executable space protection do for you?

A

Prevents OS and applications from using parts of the memory to execute code and thwart an attack from hijacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the principle of least privilege apply to operating system hardening?

A

Makes system more secure. If attacker gets access to members account with least privilege (just enough to do their job) little can be done. If the client has a ton of privilege they have the keys to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Download Nmap from https://www.nmap.org and install it. Conduct a basic scan of scanme.nmap.org using either the Zenmap GUI or the command line (nmap <ip> is a good place to start). What ports can you find open?</ip>

A

several

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operating system security includes securing the operating system (OS) to prevent what?

A

unauthorized access and reduce vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the five steps to harden an OS:

A
  1. remove unnecessary software/services,
  2. alter default accounts,
  3. apply least privilege,
  4. perform updates,
  5. enable logging/auditing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you mitigate threats to the OS? 4 ways

A

Mitigate threats through OS hardening, anti-malware tools, firewalls, and intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ _________may have excessive permissions or standard/no passwords, posing security risks.

A

Default accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mitigate risks by disabling/removing unnecessary ________, renaming ______ accounts, and changing default _______.

A

accounts; admin; passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Newly installed systems should be __________ before connecting to networks to prevent compromise.

A

patched

17
Q

Configure and enable appropriate ____________ to record important processes and activities.

A

Logging/auditing features

18
Q

Anti-malware tools use ______ and _______ to detect threats.

A

signatures; heuristics

19
Q

Anti-malware tools respond to threats by? 3 ways

A

killing processes, deleting/quarantining files, or leaving them alone.

20
Q

Anti-malware tools are installed on individual _____,_______ , and ____ _____

A

systems; servers; proxy servers.

21
Q

__________ _________ _________ prevents code execution in certain memory portions, mitigating buffer overflow attacks.

A

Executable space protection

22
Q

_________ _________ __________ _________ shifts memory contents to make tampering more difficult.

A

Address Space Layout Randomization (ASLR)

23
Q

_____________and ______________ add security layers to individual hosts.

A

Software firewalls ;host intrusion detection systems

24
Q

Host-based IDS analyze activities on or directed at a__________.

A

host’s network interface

25
Q

_________ _______________often have graphical interfaces and can be configured for automatic attacks

A

Exploit frameworks

26
Q

Popular exploit frameworks include (3).

A

Metasploit, Immunity CANVAS, and Core Impact.

27
Q

Centrally managed host IDS may have ______________issues during attacks.

A

communication

28
Q

________ ________ _____ can also assess host security.

A

Network security tools

29
Q

_________ ____________can detect open ports, service versions, and network information.
*

A

Scanning tools

30
Q

__________scripting Engine allows custom functionality and has extensive documentation.

A

Nmap

31
Q

_____ ____ _________ find and report known vulnerabilities in network services.

A

Vulnerability assessment tools

32
Q

__________: scanning tool with graphical interface for vulnerability assessment.

A

OpenVAS

33
Q

_______________take advantage of software flaws; security professionals use them to assess system security.

A

Exploits

34
Q

_____________ ____________ are collections of prepackaged exploits and tools for easier use.

A

Exploit frameworks

35
Q

____________ is used for port scanning, discovering devices, and searching for hosts on a network. It is an important tool to help identify and remove unessential services when hardening an opera

A

Nmap

36
Q

Wireshark is a __________ that is capable of __________ and ___________ traffic from both _____________ and __________ sources.

A

sniffer; intercepting; troubleshooting; wired and wireless

37
Q

________ are used to analyze activities on or directed at the network interface of a particular host.

A

HIDS - Host Based Intrusion detection system.

38
Q
A