Chapter 21: Security Flashcards

1
Q

_______ is any type of software that is used to disrupt computers and gain unauthorized access to systems, networks, and data

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______ is a software that spies on system activities and transits details of web searches and other activities to remove computers

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ______ is a program that infects files in a operating systems by rewriting those files so that they do what the programmer wants

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ can self replicate and no user intervention is required

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ are malware programs disguised as popular videos or website links that trap keystrokes or transmit sensitive information

A

trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______ are a concealment method used by many types of malware to prevent detection by normal anivirus and anti malware programs

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ uses malware to encrypt the targeted computer’s files.

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A __________ takes advantage of a not yet patched security flaw in an operating system or app, frequently on the same day the vulnerability has become known.

A

zero day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ________ is a computer on the Internet that has been taken over by a hostile program so it can be used for malware distribution, distributed denial of service (DDoS) or other attacks without notification to the normal users of the computer

A

Zombie/Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ is a method of cracking passwords by calculating and using every possible combination of characters until the correct password is discovered

A

Brute forcing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___________ attempt to crack passwords by trying all the words in a list

A

dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_________ are systems that are tagged by a configuration manager application because they do not have the most up to date security patches installed

A

non compliant systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ occurs when an unauthorized person attempts to accompany an authorized person into a secure area by following them closely and grabbing the door before it shuts.

A

tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If an authorized persona knownlying participates in tailgating, this is called _________

A

piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ________ attack involves the attacker intercepting a connection while fooling the endpoints into thinking they are communicating directly with each other

A

man in the middle (MiTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The sending of unauthorized messages over a Bluetooth connection to a device

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Provides unauthorized access from a wireless device through a Bluetooth connection

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Creates unauthorized backdoor access to connect a Bluetooth device back to the attacker

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the 4 factors of preventing security breaches

A
  1. physical security
  2. digital security
  3. user education/ acceptable use policy (AUP)
  4. principle of least privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

can be used to secure laptops and other equipment that include the Kensington security lock port

A

cable locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_____ refers to the use of biological information, such as human body characteristics, to authenticate a potential user of a secure area.

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the most common type of biometric security system for PCs?

A

fingerprint based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

an ID badge that uses radio frequency identification technology that store information about the user

A

RFID badge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the 2 phase authentication protocol for key fobs as security devices?

A
  1. the user logs into the key fob with a PIN
  2. The user logs into the system or restricted area using a randomly generated access code that refreshes every 30 to 60 seconds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
_______ is the term used in OS X and Linux for configuring the access levels a user has to a directory (folder) and individual files
Directory permissions
26
In Windows, the equivalent term for directory permissions is _________
file and folder permissions
27
What is the most common type of VPNs?
PPTP (uses 128 bit encryption) and L2TP/IPsec (combined; uses 256 bit encryption)
28
_______ refers to the prevention of confidential information from being viewed or stolen by unauthorized parties by observing and analyzing unusual patterns of data access, email and instant messaging
DLP (Data loss/leakage prevention)
29
______ refers to preventing specified UDP or TCP ports form being used by a service, application, specific device, or all devices with a firewall appliance or software firewall
disabling ports
30
________ are included in software and used to identify the publisher; most OS display warning messages when an app without one is being installed; some block installation of an app without one
digital certificates
31
What are the 3 standard account levels in Windows?
standard user, administrator, and guest
32
______ have permission to perform routine tasks but are blocked from performing tasks that involve system wide changes unless they can provide an admin password when prompted by User Account Control
Standard User
33
_____ are users with an administrator account and can perform any and all tasks
Administrator
34
______ the most limited level in Windows, cannot install software or hardware or run existing applications and cannot access files in shared document folders
Guest
35
______ account is disabled in Windows by default. If it is enabled for a user to gain access to the computer, that access should be temporary and the account should be disabled again when the user no longer requires access.
guest
36
______ account was in earlier version of Windows; had more permissions than standard users but fewer than administrators; in Windows Vista and later, they have the same rights and permissions as standard users
power users
37
________ control both local and network access, and can be set for individual users or groups, while _________ affect only network shares.
NTFS permissions; share permissions
38
When you move a folder or file to a different location on the same volume, the folder or file __________
retains its original permissions
39
When you copy a folder or file on the same, or to a different volume, the folder or file _________________
inherits the permissions of the parent folder it was copied to
40
__________ are used in Windows to indicate how files can be treated
file attributes
41
A folder or file permission that gives complete access to contents of a folder
full control
42
A folder or file permission that allows you to change file or folder contents
modify
43
A folder or file permission that allows you to access file or folder contents and run programs
read & execute
44
A folder or file permission that allows you to display folder contents
list folder contents
45
A folder or file permission that allows you to access a file or folder
read
46
A folder or file permission that allows you to add a new file or folder
write
47
_______ describes how files and folders receive permissions. Any permissions that you set in the parent will be inherited by the subfolder
permission propagation and inheritance
48
What are the 5 steps to making system files and folders visible?
1. click tools 2. click folder options 3. click view 4. click show hidden files, folders, and drives 5. click hide protected operating system files
49
Windows includes a variety of authentication protocols that can be used on a corporate network such as _______ (4 examples)
Kerberos, TLS/SSL, PKU2U, NTLM
50
A full disk encryption software developed for business oriented versions of Windows by Microsoft that can encrypt the entire disk and is transparent to users
BitLocker
51
What are the 3 requirements for Bitlocker
1. A Trusted Platform Module (TPM) or 2. An external USB key to store the encrypted keys 3. A hard drive with 2 volumes
52
BitLocker software is based on the __________ and uses a _______ encryption key
Advanced Encryption Standard; 128 Bit
53
Starting with Windows Vista SP1, BitLocker can be used to _________
encrypt internal hard disk volumes other than the system drive
54
In Windows 7 and later versions, BitLocker functionality is extended to external USB drives (including flash drives) with _____________
BitLocker to Go
55
_______ is offered by business editions of Windows and can be used to protect sensitive data files and temporary files and can be applied to individual files or folders
EFS (Encrypting File System)
56
How can the CMOS password be removed?
1. by resetting the CMOS. reset the CMOS by removing the CMOS battery for a few minutes
57
A security measure that when enabled, it prompts the user to enter a password for the hard drive when the computer is first booted
HDD password
58
To enable the recovery of EFS encrypted files in the event that Windows cannot start, you should export the user's ________
EFS Security key
59
How to set password policy that require the user change password periodically
Computer Configuration> Windows Settings> Security Options
60
How to set policy that inform in advance that passwords are about to expire, require complex password, prevent old password from being used, or require a minimum password length
Computer Configuration> Windows Settings>Account Policies> Password Policy
61
How to set policy to have user wait a certain # of minutes after unsuccessful log in attempts to log in again
Computer Configuration> Windows Settings>Account Policies> Account Lockout Policy
62
5 account management settings that can enhance security
1. restricting user permissions 2. login time restrictions 3. disabling guest account 4. failed attempts lockout 5. timeout/screen lock
63
When you ___________ an optical disc or USB drive wont automatically start its autorun application and any embedded malware wont have a chance to infect the system before you can scan the media
disable autorun
64
How do you turn off Autorun in Windows Vista/7/8/8.1/10
open the autoplay applet in control panel, clear the Use Autoplay for all media a devices and select save
65
How do you turn off Autorun/autoplay in Windows 8/8.1
search for "autoplay settings" and clock it; in the pc and devices menu, move the Use AutoPlay for all media and devices slider to off
66
What patch/ update management system is uses for OS, Windows and Linux
OS X- OS X Server's Software update service Windows- Microsoft's Window Server Update Services (WSUS) Linux- several but Yellowdog Updater Modifies is popular
67
If ___________ is check marked, and a user accesses a website or application that requires a secure certificate, the credentials are stored on the device
use secure credentials
68
By default, secure credentials are ________ after a session is over
dropped
69
________ is able to secure, monitor, manage, and support multiple different mobile devices across the enterprise
Mobile Device Managment
70
An ____________ is used to receive or generate authentication codes for one o f more apps or services
authenticator application
71
Apple does not include a firewall because the design of iOS uses a feature called _______ that runs apps in separate protected space
sandboxing
72
5 profile security requirements for security devices:
1. specifying approved devices and OS versions 2. requiring passwords and lock screens 3. device encryption 4. support issues 5. when and how to remove company info when an employees leaves the organization
73
5 types of physical destruction methods
1. shredder (recommended for optical media) 2. drill/hammer 3. electromagnetic (degaussing) (best method) 4. incineration 5. certificate of destruction
74
_____ is a quick format that only clears the root folder; the remainder of the data on the disk can be recovered until it is overwritten
standard format
75
______ is performed by the drive manufacturer before the drive is shipped and cannot be performed in the field
low level format
76
____ is writing on the hard disk or SSD's data area with zeros; data could still be recovered
overwrite
77
To assure the complete destruction of data on a storage device, it must be overwritten. Name 2 programs that exceed data destruction standards.
1. DoD 5220.22-M (7 passes) | 2. Peter Gutman's 35 pass max security method