Chapter 17 Flashcards

1
Q

The for common prevention methods are?p799

A

physical security
digital security
user education
principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

bag of elements that can be added to an environment to aid in securing it.p799

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device.p800

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

include fingerprint/palm/hand scanners, retinal scanners, and soon, possibly, DNA scanners. p801

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

any form of identification intended to differentiate the holder from everyone else. This can be as simple as a name badge or photo ID. p801

A

Badges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

They are security devices that you carry with you; they display a randomly generated code that you can then use for authentication.p801

A

Key Fobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

type of badge or card that gives you access to resources, including buildings, parking lots, and computers. p801

A

RFID Badges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

are anything that a user must have on them to access network resources and are often associated with devices that enable the user to generate a one-time password authenticating their identity. p802

A

RSA Tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

r film or glass add-ons that are placed over a monitor or laptop screen to prevent the data on the screen from being readable when viewed from the sides.p802

A

Privacy Filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As the name implies, matches are made based upon identification of the blood vessels in an individual’s retina. p802

A

Retinal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

keeping harmful data and malware out as well as on authorization and permissions. p802

A

Digital Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

application that is installed on a system to protect it and to scan for viruses as well as worms and Trojan horses.p802

A

Antivirus Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

There are different types of firewalls, and they can be either stand-alone systems or included in devices such as what? p803

A

routers or servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

passes or blocks traffic to specific addresses based on the type of application and the port used. p804

A

Packet filter firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

are used to process requests from an outside network; the proxy firewall examines the data and makes rule-based decisions about whether the request should be forwarded or refused. p804

A

Proxy firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

referred to as stateful packet filtering. Most of the devices used in networks don’t keep track of how information is routed or used. After a packet is passed, the packet and path are forgotten. p805

A

Stateful inspection firewalls

17
Q

(UDP)stands for what? p806

A

User Datagram Protocol (UDP)

18
Q

(ICMP)stands for what? p806

A

Internet Control Message Protocol (ICMP)

19
Q

a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. p809

A

Social Engineering

20
Q

these uninvited intruders may damage the data on your hard disk, destroy your operating system, and possibly spread to other systems. p810

21
Q

are software programs that have the ability to hide certain things from the operating system; they do so by obtaining (and retaining) administrative-level access.p810

22
Q

social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request. p810

23
Q

When you combine phishing with Voice over IP (VoIP), it becomes known as what?p811

24
Q

Two other forms of phishing to be aware of are. p811

A

spear phishing and whaling,

25
They can see you entering a password, typing in a credit card number, or entering any other pertinent information. The best defense against this type of attack is simply to survey your environment before entering personal data.p811
Shoulder Surfing
26
program monitors the user’s activity and responds by offering unsolicited pop-up advertisements (sometimes known as adware), gathers information about the user to pass on to marketers, or intercepts personal data such as credit card numbers.p811
Spyware
27
classified as polymorphic, stealth, retrovirus, multipartite, armored, companion, phage, and macro viruses. p812
Viruses
28
cover themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus.p814
Armored virus
29
attaches itself to legitimate programs and then creates a program with a different filename extension.p815
Companion virus
30
exploits the enhancements made to many application programs. Programmers can expand the capability of applications such as Microsoft Word and Excel.p815
Macro virus
31
attacks your system in multiple ways. It may attempt to infect your boot sector, infect all of your executable files, and destroy your application files.p815
Multipartite virus
32
alters other programs and databases. The virus infects all of these files. The only way to remove this virus is to reinstall the programs that are infected. p815
Phage virus
33
change form to avoid detection. These types of viruses attack your system, display a message on your computer, and delete files on your system.p816
Polymorphic virus
34
can directly attack your antivirus software and potentially destroy the virus definition database file. Destroying this information without your knowledge would leave you with a false sense of security.p816
Retrovirus
35
attempts to avoid detection by masking itself from applications. It may attach itself to the boot sector of the hard drive. p816
Stealth virus
36
different from a virus in that it can reproduce itself, it’s self-contained, and it doesn’t need a host application to be transported.p817
Worms
37
are programs that enter a system or network under the guise of another program.p818
Trojans
38
what are the seven workstation security best practices. p818
``` Set strong passwords Require passwords Restrict user permissions Change default usernames Disable the guest account Make the screensaver require a password Disable autorun functionality ```
39
Most vendors recommend that you use nonalphabetic characters such as _________in your password, and some go so far as to require it .p819
#, $, and %