Ch16 Security Flashcards
Virus
Code that runs on a computer without the user’s knowledge; it infects the computer when code is accessed and executed.
Worm
Similiar to viruses except that it self-replicates.
Trojan Horse
Appears to perform legitimate function but are actually performing malicious functions behind the scenes.
Spyware
Malicious software either downloaded unwittingly from a website or installed along with some other third-party software.
Rootkit
Software designed to gain administrator-level control over a computer system without being detected.
Spam
The abuse of electronic messaging systems such as e-mail, broadcast media, and instant messaging.
Clearing
Removal of data with a certain amount of assurance that it cannot be reconstructed.
Purging
aka sanitizing; removal of data done in such a way that the data cannot be reconstructed. may use bit-level erasure software to completely destroy all data on the media.
What type of malware self-replicates
worm
What type of malware is the abuse of electronic messaging systems?
Spam
List three symptons of viruses?
- Computer runs slowly.
- Computer lock ups.
- Unusual error messages are displayed.
What is the science of recognizing humans based on physical characteristics?
biometrics
A hard drive needs to be disposed of in a way so taht no one can access the data.
Which method should you use?
Destruction
Which is the best mode to use when scanning for viruses?
safe mode.
What are five ways to prevent spyware?
- Adjust Internet Explorer security settings.
- Install antispyware software.
- Uninstall unnecessary applications and services.
- Educate users on how to surf the web safely.
- Consider technologies that discourage spyware.
One of your customers tells you that a bank employee called and asked for the person’s bank balance and telephone number.
What is this an example of?
Social Engineering
Turn on User Account Control in Win 7
Start >> Control Panel >> User Accounts and Family Safety >> User Accounts >> click Change User Account Control settings link.
Four levels of Win 7 UAC
- Always Notify
- Default: Notify Me Only When Programs Try to Make Chances to My Computer.
- Notify Me Only When Programs Try to Make Changes to My Computer (Do Not Dim My Desktop)
- Never Notify - Shuts off UAC
Where are NTFS permissions found?
Security Tab of the folder’s Properties Window.
Two Components Needed for BitLocker Encryption
- Trusted Platform Module - Chip on motherboard that stores encrypted keys or external USB key to store the encrypted keys.
- Hard drive with two volumes, preferably created during installation of Windows.
Why does BitLocker need two volumes on a hard drive?
One volume is needed for the operating system that will be encrypted, the other volume is the active volume that remains unencrypted so the computer can boot.
Name a common security component of Win7/Vista?
User Account Control (UAC)
A user complains that while away at lunch someone used his computer to send e-mails to other co-workers without his knowledge. What should you recommend?
Use the Windows Lock feature.
What best describes encryption?
Prevents unauthorized users from viewing or reading data.
One of the user’s on your network is trying to access files shared on a remote computer. The file’s share permissions allow the user full control. But, the NTFS permissions allow the user Read access.
What will be the resulting access for the user ?
Read access.
- You are the administrator for your network. You set up an administrative share called Data$. What is necessary for another user to access this share ?(Two Possible answers)
- The user must have permissions to access the share.
- The user must know the exact network path to the share.
WEP Description / Encryption Level
- Wired Equivelant Privacy
- 64 bit
WPA Description / Encryption Level
- Wi-Fi Protected Access
- 128 bit
WPA2 Description / Encryption Level
- Wi-Fi Protected Access v2
- 256 bit
TKIP Description / Encryption Level
- Temporal Key Integrity Protocol - deprecated used with WEP / WPA
- 128 bit
CCMP Description / Encryption Level
- Counter Mode with Cipher Block Chaining Message Authentication Code Protocol; used with WPA2
- 128 bit
AES Description / Encryption Level
- Advanced Encryption Standard; used with WPA/WPA2
- 128, 192, and 256 bit
Seven Ways to Secure SOHO Routers
- Change default passwords
- Changing / Disabling the SSID
- Configuring Wireless Encryption
- Enabling MAC Filtering
- Disabling WPS
- Assigning Static IP Addresses
- Disabling physical ports.
What describes the attempt to guess a password by using a combination of letters and numbers?
Brute Force
List three ways to help secure a SOHO Router
- Change default passwords
- Enable MAC filtering
- Enable WPA2
What is the strongest form of wireless encryption?
AES
You want to prevent rogue employees from connecting a laptop to the SOHO router and accessing the network. List two ways to accomplish this.
- Enable MAC filtering
- Disable physical port.