Chapter 17 - Security Flashcards
4 basic security elements
17-799
physical security
digital security
user education
principle of least privelage
what is the objective of a physical barrier?
17-800
to prevent access to computers and network systems
you have a mantrap and a key fob. which one is middle barrier and which one is inner barrier?
17-800
mantrap - middle
key fob - inner
are mantraps actually a great way to stop tailgating?
17-800
yes
what is a key fob?
17-801
security devices you carry with you and they display a randomly generated code that you use for authentication (code usually changes every 60 seconds)
tell me a well known vendor of key fobs
17-801
RSA
give me an example of RSA token
17-802
SecurID
you are using the layered approach for your antivirus software. since this is the case, tell me three areas in your network where you will have the antivirus software.
17-803
the gateways
the servers
the desktops
what categorizes something as an appliance?
17-803
it should be a freestanding device that operates in a largely self-contained manner.
tell me three of the most common functions that firewalls perform
17-804,805
packet filter
proxy
stateful inspection
tell me two types of proxy firewalls
17-805
application level proxy
circuit level proxy
give me another name for a proxy firewall
17-805
dual homed firewall, because of the two NICs
tell me what these two acronyms stand for:
UDP and ICMP
17-806
user datagram protocol
internet control message protocol
what governs the permission on a directory?
17-807
the NTFS permissions and share permissions
according to the book, what is the most effective method of preventing viruses, spyware, and harm to data?
17-808
education
what is a rootkit?
17-810
software programs that have the ability to hide certain things from the operating system by obtaining administrative level access
phishing is a simple form of social engineering, but what about spear phishing and whaling?
17-811
spear phishing - when the attacker phishes for you by posing as someone that you know or something that you trust.
whaling - phishing for a BIG user
what’s the difference between spyware and adware?
17-811
spyware is a type of malware
adware is a subcategory of spyware
8 kinds of viruses
17-812
- polymorphic - change form to avoid detection
- stealth - avoids detection by masking itself from applications
- retrovirus - attacks or bypasses the antivirus software installed on a computer
- multipartite - infects boot sector, executable files, and application files all at once
- armored - covered with protective code
- companion - attaches to legitimate program, creates a copy of that program but with a different file extension
- phage - alters programs and databases
- macro - exploits enhancements made to applications
what’s a trojan horse?
17-818
program that enters a system under the guise of another program
true/false: disabling the guest account, disabling autorun, and putting a password on the screensaver are ALL good practices for security.
17-820
true
what is more effective: a standard format or a low-level format performed on a drive?
17-821
low level
what’s a command you can run to erase your SATA drive?
17-822
HDDERASE
what command do you use to find out your MAC address?
17-827
IPCONFIG /ALL
FAT 32 has two types of protection. what are they?
17-828
share level access privelages
user level access privelages