6.1 Operating System Security Flashcards

1
Q

What does address space layout randomization do?

A

A technique an OS uses to shift memory in use around so tampering with it is more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an exploit framework?

A

A collection of prepacked exploits and tools such as network mapping tools and sniffers - can be used to asses vulnerability of own network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a port scanner and a vulnerability assessment tool?

A

Scanners detects flaws in the host, ie - Nmap looks for open ports - Vulnerability tool looks for the actual network services running on the host. OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the concept of an attack surface.

A

The sum of the areas that an OS could be attacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why might you want a firewall on your host if one already exists on the network?

A

Adds an extra layer of security - will packet filter and stateful packet inspection -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is operating system hardening?

A

Configuring the OS for enhanced security; OS hardening reduces attack surface by decreasing available avenues for attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the XD bit, and why do you use it?

A

XD (Execute Disable Bit) is Intel’s version of Executable Space Protection. (AMD calls it Enhance Virus Protection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does executable space protection do for you?

A

Prevents OS and applications from using parts of the memory to execute code and thwart an attack from hijacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the principle of least privilege apply to operating system hardening?

A

Makes system more secure. If attacker gets access to members account with least privilege (just enough to do their job) little can be done. If the client has a ton of privilege they have the keys to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Download Nmap from https://www.nmap.org and install it. Conduct a basic scan of scanme.nmap.org using either the Zenmap GUI or the command line (nmap <ip> is a good place to start). What ports can you find open?</ip>

A

several

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operating system security includes securing the operating system (OS) to prevent what?

A

unauthorized access and reduce vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the five steps to harden an OS:

A
  1. remove unnecessary software/services,
  2. alter default accounts,
  3. apply least privilege,
  4. perform updates,
  5. enable logging/auditing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you mitigate threats to the OS? 4 ways

A

Mitigate threats through OS hardening, anti-malware tools, firewalls, and intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ _________may have excessive permissions or standard/no passwords, posing security risks.

A

Default accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mitigate risks by disabling/removing unnecessary ________, renaming ______ accounts, and changing default _______.

A

accounts; admin; passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Newly installed systems should be __________ before connecting to networks to prevent compromise.

17
Q

Configure and enable appropriate ____________ to record important processes and activities.

A

Logging/auditing features

18
Q

Anti-malware tools use ______ and _______ to detect threats.

A

signatures; heuristics

19
Q

Anti-malware tools respond to threats by? 3 ways

A

killing processes, deleting/quarantining files, or leaving them alone.

20
Q

Anti-malware tools are installed on individual _____,_______ , and ____ _____

A

systems; servers; proxy servers.

21
Q

__________ _________ _________ prevents code execution in certain memory portions, mitigating buffer overflow attacks.

A

Executable space protection

22
Q

_________ _________ __________ _________ shifts memory contents to make tampering more difficult.

A

Address Space Layout Randomization (ASLR)

23
Q

_____________and ______________ add security layers to individual hosts.

A

Software firewalls ;host intrusion detection systems

24
Q

Host-based IDS analyze activities on or directed at a__________.

A

host’s network interface

25
_________ _______________often have graphical interfaces and can be configured for automatic attacks
Exploit frameworks
26
Popular exploit frameworks include (3).
Metasploit, Immunity CANVAS, and Core Impact.
27
Centrally managed host IDS may have ______________issues during attacks.
communication
28
________ ________ _____ can also assess host security.
Network security tools
29
_________ ____________can detect open ports, service versions, and network information. *
Scanning tools
30
__________scripting Engine allows custom functionality and has extensive documentation.
Nmap
31
_____ ____ _________ find and report known vulnerabilities in network services.
Vulnerability assessment tools
32
__________: scanning tool with graphical interface for vulnerability assessment.
OpenVAS
33
_______________take advantage of software flaws; security professionals use them to assess system security.
Exploits
34
_____________ ____________ are collections of prepackaged exploits and tools for easier use.
Exploit frameworks
35
____________ is used for port scanning, discovering devices, and searching for hosts on a network. It is an important tool to help identify and remove unessential services when hardening an opera
Nmap
36
Wireshark is a __________ that is capable of __________ and ___________ traffic from both _____________ and __________ sources.
sniffer; intercepting; troubleshooting; wired and wireless
37
________ are used to analyze activities on or directed at the network interface of a particular host.
HIDS - Host Based Intrusion detection system.
38