Chapter 2 Flashcards

1
Q

Network Monitors

A

AKA Sniffers

help troubleshoot network problems. Dig much deeper than IPconfig to tell you what’s actually going on on the network.

Today consists of a PC with an NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Promiscuous Mode

A

The network card looks at the packet that it sees on the network even if it is not addressed to that file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application Log

A

This log contains various events logged by applications or programs. Many applications will record their errors in the log. Provides clues that someone has been attempting to compromise the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Log

A

Contains successful/unsuccessful logon attempts. Also records events related to resource use such as creating, opening, or deleting files/objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Extensions used to save a log file

A

EVT, TXT, CSV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

File/Print Server Vulnerabiliy

A

DoS attacks and access attacks. Target a specific port and overwhelm the the port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RPC

A

Remote Procedure Call

programing interface that allows a remote computer to run programs on a local machine. Contains serious vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Place where common attacks to Networks with PC-Based systems

A

NetBIOS services: ports 135, 137, 138, and 139

To prevent make sure that NetBIOS services are disabled on servers or that an effective firewall is in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Place to look for up to date informations on Windows operating system issues

A

Microsoft Safety and Security Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which software should you keep on your computer?

A

Only relevant software should be kept on the computer

If it isn’t essential, get rid of it!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Patches. What they are and when to get them (not the types)

A

An update to a system. Can add new functionality or fix a bug in the software. In a business test them first to make sure they won’t mess everything up. In personal use let them auto update.

Also what a pirate wears over his/her eye.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Three types of patches

A
  1. Service Pack - corrects problems within a version of the product
  2. Updates - code fixes for products that are provided in the event of critical problems
  3. Security Updates - Mandatory updates to make sure that known security problems are fixed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UAC best practices

A

User Account Control

Disable unnecessary accounts: they allow for a door into the system. These include former employees and guest accounts

Require passwords: you should always require passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does $ denote?

A

Hidden administrative files. They manage a computer on a network and can only be deleted through Registry edits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Should you use MAC filtering or port authentication?

A

Why not both? MAC filtering can be circumvented fairly simply unless you authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Four good ideas to Secure a network

A

MAC Limiting/Filtering
802.1X
Disable Unused Ports
Rogue Machine Detection

17
Q

Hardening

A

general process of making sure that the OS itself is as secure as it can be

18
Q

Hazard of disabling a service and how to avoid it

A

Other services may be dependent on that service to function. Microsoft Services Console gives information on dependencies.

19
Q

Which file system does Microsoft recommend network shares are established using?

A

NTFS

20
Q

Rogue Machines

A

Adding an unauthorized machine on to the system. Possibly an intruder or a neighboring office connecting to your wireless

21
Q

EAP

A

Extensible Authentication Protocol

authentication framework frequently used in wireless networks and point-to-point connections

22
Q

Common aspects of security audits

A

Review security logs
Review policies and compliance
Check security device configuration
Review Incident Response Reports

23
Q

First two steps after a gap in security posture is detected

A
  1. Classify the gap

2. Begin implementing a plan to remmediate it

24
Q

Three Classifications of threats

A

Minor - no immediate threat
Serious - possible immediate threat
Critical - total disaster! Respond immediately!

25
Q

Alerts versus Alarms

A

Alerts are issues that need to be addressed, but they are not immediate

Alarms are immediate. Fix it.