Chapter 17 Flashcards

1
Q

The for common prevention methods are?p799

A

physical security
digital security
user education
principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

bag of elements that can be added to an environment to aid in securing it.p799

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device.p800

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

include fingerprint/palm/hand scanners, retinal scanners, and soon, possibly, DNA scanners. p801

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

any form of identification intended to differentiate the holder from everyone else. This can be as simple as a name badge or photo ID. p801

A

Badges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

They are security devices that you carry with you; they display a randomly generated code that you can then use for authentication.p801

A

Key Fobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

type of badge or card that gives you access to resources, including buildings, parking lots, and computers. p801

A

RFID Badges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

are anything that a user must have on them to access network resources and are often associated with devices that enable the user to generate a one-time password authenticating their identity. p802

A

RSA Tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

r film or glass add-ons that are placed over a monitor or laptop screen to prevent the data on the screen from being readable when viewed from the sides.p802

A

Privacy Filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As the name implies, matches are made based upon identification of the blood vessels in an individual’s retina. p802

A

Retinal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

keeping harmful data and malware out as well as on authorization and permissions. p802

A

Digital Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

application that is installed on a system to protect it and to scan for viruses as well as worms and Trojan horses.p802

A

Antivirus Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

There are different types of firewalls, and they can be either stand-alone systems or included in devices such as what? p803

A

routers or servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

passes or blocks traffic to specific addresses based on the type of application and the port used. p804

A

Packet filter firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

are used to process requests from an outside network; the proxy firewall examines the data and makes rule-based decisions about whether the request should be forwarded or refused. p804

A

Proxy firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

referred to as stateful packet filtering. Most of the devices used in networks don’t keep track of how information is routed or used. After a packet is passed, the packet and path are forgotten. p805

A

Stateful inspection firewalls

17
Q

(UDP)stands for what? p806

A

User Datagram Protocol (UDP)

18
Q

(ICMP)stands for what? p806

A

Internet Control Message Protocol (ICMP)

19
Q

a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. p809

A

Social Engineering

20
Q

these uninvited intruders may damage the data on your hard disk, destroy your operating system, and possibly spread to other systems. p810

A

Malware

21
Q

are software programs that have the ability to hide certain things from the operating system; they do so by obtaining (and retaining) administrative-level access.p810

A

Rootkits

22
Q

social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request. p810

A

Phishing

23
Q

When you combine phishing with Voice over IP (VoIP), it becomes known as what?p811

A

vishing

24
Q

Two other forms of phishing to be aware of are. p811

A

spear phishing and whaling,

25
Q

They can see you entering a password, typing in a credit card number, or entering any other pertinent information. The best defense against this type of attack is simply to survey your environment before entering personal data.p811

A

Shoulder Surfing

26
Q

program monitors the user’s activity and responds by offering unsolicited pop-up advertisements (sometimes known as adware), gathers information about the user to pass on to marketers, or intercepts personal data such as credit card numbers.p811

A

Spyware

27
Q

classified as polymorphic, stealth, retrovirus, multipartite, armored, companion, phage, and macro viruses. p812

A

Viruses

28
Q

cover themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus.p814

A

Armored virus

29
Q

attaches itself to legitimate programs and then creates a program with a different filename extension.p815

A

Companion virus

30
Q

exploits the enhancements made to many application programs. Programmers can expand the capability of applications such as Microsoft Word and Excel.p815

A

Macro virus

31
Q

attacks your system in multiple ways. It may attempt to infect your boot sector, infect all of your executable files, and destroy your application files.p815

A

Multipartite virus

32
Q

alters other programs and databases. The virus infects all of these files. The only way to remove this virus is to reinstall the programs that are infected. p815

A

Phage virus

33
Q

change form to avoid detection. These types of viruses attack your system, display a message on your computer, and delete files on your system.p816

A

Polymorphic virus

34
Q

can directly attack your antivirus software and potentially destroy the virus definition database file. Destroying this information without your knowledge would leave you with a false sense of security.p816

A

Retrovirus

35
Q

attempts to avoid detection by masking itself from applications. It may attach itself to the boot sector of the hard drive. p816

A

Stealth virus

36
Q

different from a virus in that it can reproduce itself, it’s self-contained, and it doesn’t need a host application to be transported.p817

A

Worms

37
Q

are programs that enter a system or network under the guise of another program.p818

A

Trojans

38
Q

what are the seven workstation security best practices. p818

A
Set strong passwords
Require passwords
Restrict user permissions
Change default usernames
Disable the guest account
Make the screensaver require a password
Disable autorun functionality
39
Q

Most vendors recommend that you use nonalphabetic characters such as _________in your password, and some go so far as to require it .p819

A

, $, and %