Chapter 17 - Security Flashcards

1
Q

4 basic security elements

17-799

A

physical security
digital security
user education
principle of least privelage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the objective of a physical barrier?

17-800

A

to prevent access to computers and network systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

you have a mantrap and a key fob. which one is middle barrier and which one is inner barrier?

17-800

A

mantrap - middle

key fob - inner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

are mantraps actually a great way to stop tailgating?

17-800

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a key fob?

17-801

A

security devices you carry with you and they display a randomly generated code that you use for authentication (code usually changes every 60 seconds)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

tell me a well known vendor of key fobs

17-801

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

give me an example of RSA token

17-802

A

SecurID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

you are using the layered approach for your antivirus software. since this is the case, tell me three areas in your network where you will have the antivirus software.

17-803

A

the gateways
the servers
the desktops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what categorizes something as an appliance?

17-803

A

it should be a freestanding device that operates in a largely self-contained manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

tell me three of the most common functions that firewalls perform

17-804,805

A

packet filter
proxy
stateful inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

tell me two types of proxy firewalls

17-805

A

application level proxy

circuit level proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

give me another name for a proxy firewall

17-805

A

dual homed firewall, because of the two NICs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

tell me what these two acronyms stand for:
UDP and ICMP

17-806

A

user datagram protocol

internet control message protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what governs the permission on a directory?

17-807

A

the NTFS permissions and share permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

according to the book, what is the most effective method of preventing viruses, spyware, and harm to data?

17-808

A

education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a rootkit?

17-810

A

software programs that have the ability to hide certain things from the operating system by obtaining administrative level access

17
Q

phishing is a simple form of social engineering, but what about spear phishing and whaling?

17-811

A

spear phishing - when the attacker phishes for you by posing as someone that you know or something that you trust.

whaling - phishing for a BIG user

18
Q

what’s the difference between spyware and adware?

17-811

A

spyware is a type of malware

adware is a subcategory of spyware

19
Q

8 kinds of viruses

17-812

A
  1. polymorphic - change form to avoid detection
  2. stealth - avoids detection by masking itself from applications
  3. retrovirus - attacks or bypasses the antivirus software installed on a computer
  4. multipartite - infects boot sector, executable files, and application files all at once
  5. armored - covered with protective code
  6. companion - attaches to legitimate program, creates a copy of that program but with a different file extension
  7. phage - alters programs and databases
  8. macro - exploits enhancements made to applications
20
Q

what’s a trojan horse?

17-818

A

program that enters a system under the guise of another program

21
Q

true/false: disabling the guest account, disabling autorun, and putting a password on the screensaver are ALL good practices for security.

17-820

A

true

22
Q

what is more effective: a standard format or a low-level format performed on a drive?

17-821

A

low level

23
Q

what’s a command you can run to erase your SATA drive?

17-822

A

HDDERASE

24
Q

what command do you use to find out your MAC address?

17-827

A

IPCONFIG /ALL

25
Q

FAT 32 has two types of protection. what are they?

17-828

A

share level access privelages

user level access privelages