Ch5 Securing Individual Systems Flashcards

1
Q

most cyber-attacks are mitigated fairly quickly, one exception is ___

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a ___ attack might involve a ping flood or UDP flood

A

Volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

when a client sends continuous SYN requests without waiting for a response, this is a ___ attack

A

protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how do later versions of Apache web server defend against a slow loris attack?

A

shorter timeouts when waiting for responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

in a ___ attack, conversations are repeatedly initiated by a client with a web server but never continued

A

+++slow loris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

in a ___ attack, the IP address is spoofed so everyone starts responding to the target

A

smurf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

in a ___ attack, malware is used to generate a botnet and several computer attack the target at once

A

Distributed Denial of Service (DDOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

when spam is done over instant messaging it is called ___

A

spim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is an attempt (via email) to collect information, targeted to a particular person

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is like phishing, but more dangerous and done using voice

A

vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is just trying to get you to click on an ad, but ___ is trying to get you to click on something different than what you thought you were clicking

A

clickbait; clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is taking advantage of common typos to send you to a decoy url

A

typo squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

if you let the registration of a domain lapse, you might become a victim of ___

A

domain hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

in ___ a user’s group might be surreptitiously changed to one with more permissions

A

privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

when a 3rd party inserts themselves into a conversation without the other two knowing, this is the beginning of a ___ attack

A

man in the middle (MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

for wireless connections, ___ or ___ protocols have encryption, but ___ does not

A

WPA; WPA2; WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the ___ protocol is used to secure financial data on Bluetooth connections

A

NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

when an attacker convinces a system that his address is the target computers or vice versa, this is called ___

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ is lying to the system about the IP address for another machine

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

in a ___attack, a password or certificate is obtained, and the login performed again

A

replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

in a ___attack, the system is tricked into using a more primitive version of the protocols, which is more easily hacked

A

downgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

in ___ the attacker must enter a live conversation and inject information in real-time

A

session hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

system ___ is the ability to withstand a negative impact

A

resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

the ability to add more servers to meet changing network demand is ___, and if you can also reduce servers as demand contracts, this is called ___

A

scalability; elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

___ is a way to achieve system resiliency through the ability to return to an earlier state

A

non-persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

in ___ recovery, the system revert back to an earlier OS or application version

A

known state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

in ___ recovery, drivers revert to an earlier version

A

rollback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

in using a ___ for system recovery, a virtual installation is run in active memory only

A

live CD

29
Q

in a ___ system, several drives are used to provide inexpensive and efficient protection against loss of data

A

Redundant Array of Independent Devices (RAID)

30
Q

RAID systems work by splitting large files into clusters called ___ to distribute between drives, speeding up data access

A

stripes

31
Q

RAID systems work by duplicating data between drives, called ___, to improve data security

A

mirroring

32
Q

a RAID 2 system requires at least 3 drives, with the 3rd being a dedicated ___ drive

A

parity

33
Q

RAID __ systems can recover after losing one drive, and RAID __ systems can recover after losing 2 drives

A

5; 6

34
Q

why would proprietary RAID systems be used?

A

to accommodate different drive sizes

35
Q

one proprietary RAID system found in Windows is ___

A

storage spaces

36
Q

___ is file-level network storage, while ___ is block-level network storage

A

Network Attached Storage (NAS); Storage Area Networking (SAN)

37
Q

the best way to prevent misuse of ports and connections is to ___

A

disable them at the BIOS level

38
Q

if you cannot disable a USB port from BIOS, you can probably at least ___ so files can’t be copied from it

A

disable mass storage

39
Q

the energetic fields of devices can cause harm due to ___, or in the case of wireless routers ___

A

electro-magnetic interference (EMI); radio frequency interference (RFI)

40
Q

3 steps to reduce EMI disruption on a network would be:

A

shielding; separation; separate electrical circuits

41
Q

___ can destroy electrical circuits in a flash, but wearing an ___ protects them while you are working on them

A

electro-static charge (ESD); ESD wrist strap

42
Q

even in the absence of malware, a system can be slowed down unless you disable ___

A

unnecessary services

43
Q

a major source of attack now is through the Internet of Things devices, unless you ___

A

change their default passwords

44
Q

best practices for updating OS, application and device patches consists of 5 steps:

A

Monitor (for updates); Test (on a sandbox system); Evaluate (if needed); Deploy (without disrupting operations); Document what was done

45
Q

what does a RAID system NOT protect from?

A

power supply of other devices failing

46
Q

what will make it much less expensive to use RAID, load balancing and redundancy on a network?

A

virtualization of the drives

47
Q

___ is often the easiest way to secure data on a media, but very difficult to recover if you lose the key

A

disk encryption

48
Q

in ___ a disk is encrypted with a physical chip containing a public/private key

A

Trusted Platform Module (TPM)

49
Q

the built-in Windows version of TPM security is called __, but you may have to ___ before you can use it

A

bitlocker; enable TPM in the BIOS

50
Q

___ is a form of hardware/firmware security often found in smartphones, navigation systems, etc. (and now in Windows 10) which creates a “hardware root of trust” and a “secure supply chain”

A

Secure Boot

51
Q

sometimes a network will have a ___ just to handle security certificates

A

Hardware Security Module (HSM)

52
Q

when selecting an OS for security, follow the Principle of ___

A

Least Functionality

53
Q

versions of Windows or Linux that have been certified and locked-down are called ___

A

Trusted Operating Systems

54
Q

connecting to a Bluetooth signal in order to steal data is called ___

A

Bluesnarfing

55
Q

a wireless NIC could be inserted into a computers ___ and might go unnoticed for some time

A

SD slot

56
Q

a ___ can look just like a USB drive, but will actually be grabbing data while it is plugged in

A

Rubber Duck

57
Q

if a security camera sends video to a smartphone app, assume your video is ___

A

being monitored by another organization

58
Q

a ___ is a Trojan that is activated by an event (like the deactivation of a user account)

A

Logic Bomb

59
Q

___ is software that escalates privileges to execute other things

A

rootkit

60
Q

a ___ works with a USB device to record keystrokes

A

keylogger

61
Q

___ viruses have superfluous code to confuse anti-malware software

A

armored

62
Q

most malware today is ___ so anti-malware software has a hard time identifying it

A

polymorphic

63
Q

the output of a host-based firewall is basically a ___

A

whitelist

64
Q

firewalls are like ___ of traffic coming into a network, while ___ sends alerts if something bad is found within the network and ___ takes action to shut bad things down

A

filter; Intrusion Detection System (IDS); Intrusion Prevention System (IPS)

65
Q

automating the security of your network provides both ___ and ___

A

consistency; repetition

66
Q

when data is ___, it is overwritten with random binary code

A

wiped

67
Q

when data is ___, something external (like degaussing) is done to the drive which may make it unusable

A

purged

68
Q

one quick way to make encrypted data inaccessible is to destroy the key, this is called ___

A

crypto-erasing