CH 19 BB Flashcards

1
Q

What is physical security? Pg 897

A

Physical barriers that bar unwanted personnel entering an environment. Example: Locked doors, securing physical documents, biometrics, badges, key fobs, and privacy filters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are locked doors not a guaranteed security system? Pg 897

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is multifactor authentication? Pg 899

A

Anytime more than one item(factor) is required to authenticate a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a packet filter firewall? Pg 901

A

Passes or blocks traffic based on the packet’s addressing information(port).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a proxy firewall? Pg 901

A

Used to process requests from an outside network. Proxy firewalls examine the data and makes a rule-based decision about whether the request should be forwarded or refused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F The best method of protection is to use a layered approach. Pg 900

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are stateful inspection firewalls? Pg 902

A

Uses a table that tracks all communications channels to determine whether or not a packet that is being sent was requested from the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F DoS attacks have no adverse affect on stateful inspection firewalls. Pg 903

A

False. DoS and DDoS attacks can overload this type of firewall and cause it to crash and have to shutdown/reboot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is user education important? Pg 905

A

All employees in your network must understand why it is important to not open suspicious files and scan every disk/email/document that they receive before they open it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are AUPs? Pg 905

A

Acceptable User Policies describe how the employees in an organization can use company systems and resources, both software and hardware. Can be thought of as similar to protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the principle of least priviledge? Pg 906

A

Only assigning users the minimum amount of permissions they need to complete their work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is email filtering? Pg 906

A

Filtering out certain emails before passing it on. Spam filters are a form of email filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are VPNs? Pg 906

A

Virtual Private Networks work by sending private data across a public network by placing (encapsulating) that data into other packets. This process is known as tunneling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T/F VPNs appear as public networks. Pg 907

A

False. VPNs are created over public networks but the connection logically appears to be part of a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is social engineering? Pg 907

A

An attacker attempts to acquire information by social means, such as talking to people in the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly