Chapter 10 Flashcards
What is the benefit of device hardening?
Helps to protect your computer by reducing it’s vulnerability
What are the 4 categories that device hardening techniques fall into?
1-Updating devices and using system passwords
2-Protecting against network threats
3-Removing and disabling software services
4-Browsing the internet safely
What are the 4 classes of applications to help protect your system?
Antivirus software
Anti spyware software
Anti spam software
Software firewall - block potential dangerous network traffic
True or false their are Suites that have multiple security functiond
True
What is a MD5
Message Digest Version 5. Created by an Antivirus program for each application.
What does a change in the MD5 means
Treat as a virus
How do antivirus software identify viruses
By scanning all files on the hard disk or a subset of files that are most likely to contain virus
What are spams?
Unwanted junk mail
What is used to manage spam
Filters
How do you get to the built in update mechanisms on Windows?
Start
Settings
Update security
How do you get to the built in update mechanisms on an Apple?
Settings
General
How do you get to the built in update mechanisms an Android?
Settings
About phone
System updates
What is MD5?
Message Digest Version 5
A math calculation that results in a unique value used to reflect the data being checked.
What is the difference between deleting and quarantine?
Delete removed
Quarantine places it in an off limits area
What is the name of the anti spyware tool that comes with Windows?
Windows Defender
When are anti spyware applications most effective?
When their definitions are up to date
Steps to diagnosing and fixing malware infection
- Identify the malware symptoms
- Quarantine the infected system
- Remediate infected systems
- Schedule scans and updates
- Educate the end user to avoid a repeat performance
Where on your PC can you track CPU and memory usage?
Task manager
Performance
If you cannot use your local antivirus program what can you do?
Use an online virus checker
If your system is infected to the point that it won’t operate what can you do?
Boot into the Windows recovery environment or safe mode with networking
What are the 2 different types of firewalls?
Network based
Host based
What is the name of Windows own host based firewall?
Windows Firewall
How is uninstallation best handled in the Windows system?
Through the Programs and features option in Control Panel and Windows
Click Uninstall
What is clean uninstallation?
Using the uninstall option.
What should you do when you receive unsolicited pop up messages on your cellphone in a crowed area?
Disable Bluetooth from the settings option on iPhones and Androids
Or
Enable airplane mode
To prevent the possibility of a security hole which communication methods can you disable?
Bluetooth
Near field communication (NFC)
Other unused services
What are the key points to browsing the internet safely?
Keep your browser up to date
Manage plugins, add one, toolbars and extension
Manage security settings properly
Know how to recognize secure websites
Where do you find the auto fill settings?
Chrome
Settings
Advanced settings
Passwords
How do web browsers work?
By downloading and displaying web pages which are basically programming scripts.
What are 2 basic safe web browsing tip?
Do not visit questionable sites
Limit the use of personal identifiable information
List tips to recognize suspicious sites.
1 Look for signs of security
2 look for websites with incorrect spelling
3 communications with incorrect spelling and grammar
4 threats
5 deals that are too good to be true
What is the phishing protection filter on Microsoft based browsers?
Smartscreen filter
***In windows 10 it’s Incorporated in Windows Defender
**Google chrome also has a built in phishing protection ( settings. Show advanced settings privacy and security
How do you protect your when using Public computers?
1 don’t enter any personal information
2 no confidentiality info
3 disable autofill
4 Don’t save files to that computer
Delete browsing history, cache, and cookies after you are finished
5 always pay attention to your surroundings
What are the 3 types of accounts?
Admin/Administrator/root(on UNIX and Linux)
User
Guests
Do power users have full total admin control?
No
What is prohibited content policy or acceptable use policy
Written policies and procedures identifying actions that are appropriate and the consequences for performing those actions
What are weak passwords?
Passwords that are easy to guess
What is a cipher text
A text which has been encrypted
What are the 2 levels at which you can encrypt data on a hard drive?
At the file level
At the disk level
What needs to happen for data to be encrypted in transit?
Both systems need to support the same encryption technology
Give examples of where data is encrypted in transit.
Email
Internet browsing
Virtual private network (VPN)
Mobile application
What does PII represent?
Personally identifiable information
Should data in transit be encrypted?
Yes