622 Flashcards
A _____________is a collection of programs that grants a hacker admin access to a computer or network. The hacker first gains access to a single system, and then uploads the _________to the hacked system. An example of a _________ is a ___________module that modifies file system operations. —
rootkit / rootkit / rootkit / system-level kernel
____________is a software application that displays advertisements while the application is executing. —
Adware
Some adware is also __________if it monitors your Internet usage and personal information. Some adware will even allow credit card information theft. —
spyware
__________ often uses tracking cookies to collect and report a user’s activities. Not all _________ is adware, and not all adware is ________. To define a program as _________requires that your activities are monitored and tracked; to define a program as adware requires that advertisements are displayed. —
Spyware
A worm is a program that spreads itself through —
network connections.
Malware is the term used to describe a group of malicious software applications that include: —
Viruses Worms Spyware Trojans Rootkits Backdoors Logic bombs Botnets
Biometric locks offer the most protection from loss or theft of the access device. They are based on the security concept of —
something you are
Biometrics match a users uniquely identifiable physical attribute to a previously stored value. They are among the most
secure physical security measures
Server locks restrict access to the devices in the server cabinet. They can be locked through a key in the same manner that door —
locks can be secured
USB locks are USB flash drives that contain an ______________that unlocks the computer. When the USB drive is inserted into the port, the computer is unlocked. When the USB drive is removed, the computer is locked. —
electronic key
Key fobs contain a hardware token and are often used for______________ authentication. They are easily lost or stolen. —
Near-Field Communications (NFC
You should deploy biometrics, smart cards, and strong passwords. This covers three different factors of authentication: –
something you are
something you have
something you know
Biometrics devices help verify users’ identities against unique physical characteristics. Biometric devices include —
retinal scanners
hand scanners
fingerprint.
Smart cards, which are a type of identification badge, are used to give people access to buildings, doors and computers and parking lots. Smart cards are inserted into a computer or a smart card reader. Although you cannot duplicate them, they can be easily stolen, so modern smart cards have users enter —
passwords or PINs to activate them.
Usernames, strong passwords, and a PIN are all things you know, so this solution would not be considered —
multifactor authentication.
Smart cards, usernames, and strong passwords only include two factor types: —
something you have
something you know.
Smart cards, usernames, and PINs only include two factor types: —
something you have and something you know.
___________________is the greatest threat to the security of mobile devices. —
Theft
_____________________would protect a users data in the event of a hard drive crash. Instead of storing the users data , such as the Documents folder on the local hard drive, ______________________points to a network storage location, such as a server or a cloud location.
Folder redirection
Login scripts would allow you to assign security policies to users at the time of login, but they would not
inherently protect against a hard drive crash
Domain membership, in terms of logical security, would validate that the user, group, or device should be granted —
access to the domain.
Organizational units, in terms of logical security, would validate that the user, group, or device should be granted access to the —
appropriate portion of the domain.
Other logical security controls including maintenance of Group Policy/updates, and the location of a users —
Home Folder.
___________________ is a set of business rules that protect data in use data in motion, and data at rest. _________ is the general term for the technology used to protect a companys information from accidental or intentional leaks
Data Loss Prevention DLP
_______________________would only protect data in motion. _________________ prevents unknown devices from forwarding packets. ___________ scan data as it is entering or leaving the network and may be configured to block IP address ranges, domains, or packet content. —
Port security and firewalls
Certificates would only protect data in use. A good way to use a certificate for DLP would be to prevent a man-in-the-middle attack by —
requiring the sender or recipient certificate prior to transmitting the data.