Ch5 Securing Individual Systems Flashcards

1
Q

most cyber-attacks are mitigated fairly quickly, one exception is ___

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a ___ attack might involve a ping flood or UDP flood

A

Volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

when a client sends continuous SYN requests without waiting for a response, this is a ___ attack

A

protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how do later versions of Apache web server defend against a slow loris attack?

A

shorter timeouts when waiting for responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

in a ___ attack, conversations are repeatedly initiated by a client with a web server but never continued

A

+++slow loris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

in a ___ attack, the IP address is spoofed so everyone starts responding to the target

A

smurf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

in a ___ attack, malware is used to generate a botnet and several computer attack the target at once

A

Distributed Denial of Service (DDOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

when spam is done over instant messaging it is called ___

A

spim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is an attempt (via email) to collect information, targeted to a particular person

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is like phishing, but more dangerous and done using voice

A

vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is just trying to get you to click on an ad, but ___ is trying to get you to click on something different than what you thought you were clicking

A

clickbait; clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is taking advantage of common typos to send you to a decoy url

A

typo squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

if you let the registration of a domain lapse, you might become a victim of ___

A

domain hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

in ___ a user’s group might be surreptitiously changed to one with more permissions

A

privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

when a 3rd party inserts themselves into a conversation without the other two knowing, this is the beginning of a ___ attack

A

man in the middle (MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

for wireless connections, ___ or ___ protocols have encryption, but ___ does not

A

WPA; WPA2; WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the ___ protocol is used to secure financial data on Bluetooth connections

A

NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

when an attacker convinces a system that his address is the target computers or vice versa, this is called ___

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ is lying to the system about the IP address for another machine

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

in a ___attack, a password or certificate is obtained, and the login performed again

A

replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

in a ___attack, the system is tricked into using a more primitive version of the protocols, which is more easily hacked

A

downgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

in ___ the attacker must enter a live conversation and inject information in real-time

A

session hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

system ___ is the ability to withstand a negative impact

A

resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

the ability to add more servers to meet changing network demand is ___, and if you can also reduce servers as demand contracts, this is called ___

A

scalability; elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
___ is a way to achieve system resiliency through the ability to return to an earlier state
non-persistence
26
in ___ recovery, the system revert back to an earlier OS or application version
known state
27
in ___ recovery, drivers revert to an earlier version
rollback
28
in using a ___ for system recovery, a virtual installation is run in active memory only
live CD
29
in a ___ system, several drives are used to provide inexpensive and efficient protection against loss of data
Redundant Array of Independent Devices (RAID)
30
RAID systems work by splitting large files into clusters called ___ to distribute between drives, speeding up data access
stripes
31
RAID systems work by duplicating data between drives, called ___, to improve data security
mirroring
32
a RAID 2 system requires at least 3 drives, with the 3rd being a dedicated ___ drive
parity
33
RAID __ systems can recover after losing one drive, and RAID __ systems can recover after losing 2 drives
5; 6
34
why would proprietary RAID systems be used?
to accommodate different drive sizes
35
one proprietary RAID system found in Windows is ___
storage spaces
36
___ is file-level network storage, while ___ is block-level network storage
Network Attached Storage (NAS); Storage Area Networking (SAN)
37
the best way to prevent misuse of ports and connections is to ___
disable them at the BIOS level
38
if you cannot disable a USB port from BIOS, you can probably at least ___ so files can't be copied from it
disable mass storage
39
the energetic fields of devices can cause harm due to ___, or in the case of wireless routers ___
electro-magnetic interference (EMI); radio frequency interference (RFI)
40
3 steps to reduce EMI disruption on a network would be:
shielding; separation; separate electrical circuits
41
___ can destroy electrical circuits in a flash, but wearing an ___ protects them while you are working on them
electro-static charge (ESD); ESD wrist strap
42
even in the absence of malware, a system can be slowed down unless you disable ___
unnecessary services
43
a major source of attack now is through the Internet of Things devices, unless you ___
change their default passwords
44
best practices for updating OS, application and device patches consists of 5 steps:
Monitor (for updates); Test (on a sandbox system); Evaluate (if needed); Deploy (without disrupting operations); Document what was done
45
what does a RAID system NOT protect from?
power supply of other devices failing
46
what will make it much less expensive to use RAID, load balancing and redundancy on a network?
virtualization of the drives
47
___ is often the easiest way to secure data on a media, but very difficult to recover if you lose the key
disk encryption
48
in ___ a disk is encrypted with a physical chip containing a public/private key
Trusted Platform Module (TPM)
49
the built-in Windows version of TPM security is called __, but you may have to ___ before you can use it
bitlocker; enable TPM in the BIOS
50
___ is a form of hardware/firmware security often found in smartphones, navigation systems, etc. (and now in Windows 10) which creates a "hardware root of trust" and a "secure supply chain"
Secure Boot
51
sometimes a network will have a ___ just to handle security certificates
Hardware Security Module (HSM)
52
when selecting an OS for security, follow the Principle of ___
Least Functionality
53
versions of Windows or Linux that have been certified and locked-down are called ___
Trusted Operating Systems
54
connecting to a Bluetooth signal in order to steal data is called ___
Bluesnarfing
55
a wireless NIC could be inserted into a computers ___ and might go unnoticed for some time
SD slot
56
a ___ can look just like a USB drive, but will actually be grabbing data while it is plugged in
Rubber Duck
57
if a security camera sends video to a smartphone app, assume your video is ___
being monitored by another organization
58
a ___ is a Trojan that is activated by an event (like the deactivation of a user account)
Logic Bomb
59
___ is software that escalates privileges to execute other things
rootkit
60
a ___ works with a USB device to record keystrokes
keylogger
61
___ viruses have superfluous code to confuse anti-malware software
armored
62
most malware today is ___ so anti-malware software has a hard time identifying it
polymorphic
63
the output of a host-based firewall is basically a ___
whitelist
64
firewalls are like ___ of traffic coming into a network, while ___ sends alerts if something bad is found within the network and ___ takes action to shut bad things down
filter; Intrusion Detection System (IDS); Intrusion Prevention System (IPS)
65
automating the security of your network provides both ___ and ___
consistency; repetition
66
when data is ___, it is overwritten with random binary code
wiped
67
when data is ___, something external (like degaussing) is done to the drive which may make it unusable
purged
68
one quick way to make encrypted data inaccessible is to destroy the key, this is called ___
crypto-erasing