Chapter 21: Security Flashcards

1
Q

_______ is any type of software that is used to disrupt computers and gain unauthorized access to systems, networks, and data

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______ is a software that spies on system activities and transits details of web searches and other activities to remove computers

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ______ is a program that infects files in a operating systems by rewriting those files so that they do what the programmer wants

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ can self replicate and no user intervention is required

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ are malware programs disguised as popular videos or website links that trap keystrokes or transmit sensitive information

A

trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______ are a concealment method used by many types of malware to prevent detection by normal anivirus and anti malware programs

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ uses malware to encrypt the targeted computer’s files.

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A __________ takes advantage of a not yet patched security flaw in an operating system or app, frequently on the same day the vulnerability has become known.

A

zero day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ________ is a computer on the Internet that has been taken over by a hostile program so it can be used for malware distribution, distributed denial of service (DDoS) or other attacks without notification to the normal users of the computer

A

Zombie/Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ is a method of cracking passwords by calculating and using every possible combination of characters until the correct password is discovered

A

Brute forcing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___________ attempt to crack passwords by trying all the words in a list

A

dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_________ are systems that are tagged by a configuration manager application because they do not have the most up to date security patches installed

A

non compliant systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ occurs when an unauthorized person attempts to accompany an authorized person into a secure area by following them closely and grabbing the door before it shuts.

A

tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If an authorized persona knownlying participates in tailgating, this is called _________

A

piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ________ attack involves the attacker intercepting a connection while fooling the endpoints into thinking they are communicating directly with each other

A

man in the middle (MiTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The sending of unauthorized messages over a Bluetooth connection to a device

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Provides unauthorized access from a wireless device through a Bluetooth connection

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Creates unauthorized backdoor access to connect a Bluetooth device back to the attacker

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the 4 factors of preventing security breaches

A
  1. physical security
  2. digital security
  3. user education/ acceptable use policy (AUP)
  4. principle of least privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

can be used to secure laptops and other equipment that include the Kensington security lock port

A

cable locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_____ refers to the use of biological information, such as human body characteristics, to authenticate a potential user of a secure area.

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the most common type of biometric security system for PCs?

A

fingerprint based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

an ID badge that uses radio frequency identification technology that store information about the user

A

RFID badge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the 2 phase authentication protocol for key fobs as security devices?

A
  1. the user logs into the key fob with a PIN
  2. The user logs into the system or restricted area using a randomly generated access code that refreshes every 30 to 60 seconds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

_______ is the term used in OS X and Linux for configuring the access levels a user has to a directory (folder) and individual files

A

Directory permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In Windows, the equivalent term for directory permissions is _________

A

file and folder permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the most common type of VPNs?

A

PPTP (uses 128 bit encryption) and L2TP/IPsec (combined; uses 256 bit encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

_______ refers to the prevention of confidential information from being viewed or stolen by unauthorized parties by observing and analyzing unusual patterns of data access, email and instant messaging

A

DLP (Data loss/leakage prevention)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

______ refers to preventing specified UDP or TCP ports form being used by a service, application, specific device, or all devices with a firewall appliance or software firewall

A

disabling ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

________ are included in software and used to identify the publisher; most OS display warning messages when an app without one is being installed; some block installation of an app without one

A

digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the 3 standard account levels in Windows?

A

standard user, administrator, and guest

32
Q

______ have permission to perform routine tasks but are blocked from performing tasks that involve system wide changes unless they can provide an admin password when prompted by User Account Control

A

Standard User

33
Q

_____ are users with an administrator account and can perform any and all tasks

A

Administrator

34
Q

______ the most limited level in Windows, cannot install software or hardware or run existing applications and cannot access files in shared document folders

A

Guest

35
Q

______ account is disabled in Windows by default. If it is enabled for a user to gain access to the computer, that access should be temporary and the account should be disabled again when the user no longer requires access.

A

guest

36
Q

______ account was in earlier version of Windows; had more permissions than standard users but fewer than administrators; in Windows Vista and later, they have the same rights and permissions as standard users

A

power users

37
Q

________ control both local and network access, and can be set for individual users or groups, while _________ affect only network shares.

A

NTFS permissions; share permissions

38
Q

When you move a folder or file to a different location on the same volume, the folder or file __________

A

retains its original permissions

39
Q

When you copy a folder or file on the same, or to a different volume, the folder or file _________________

A

inherits the permissions of the parent folder it was copied to

40
Q

__________ are used in Windows to indicate how files can be treated

A

file attributes

41
Q

A folder or file permission that gives complete access to contents of a folder

A

full control

42
Q

A folder or file permission that allows you to change file or folder contents

A

modify

43
Q

A folder or file permission that allows you to access file or folder contents and run programs

A

read & execute

44
Q

A folder or file permission that allows you to display folder contents

A

list folder contents

45
Q

A folder or file permission that allows you to access a file or folder

A

read

46
Q

A folder or file permission that allows you to add a new file or folder

A

write

47
Q

_______ describes how files and folders receive permissions. Any permissions that you set in the parent will be inherited by the subfolder

A

permission propagation and inheritance

48
Q

What are the 5 steps to making system files and folders visible?

A
  1. click tools
  2. click folder options
  3. click view
  4. click show hidden files, folders, and drives
  5. click hide protected operating system files
49
Q

Windows includes a variety of authentication protocols that can be used on a corporate network such as _______ (4 examples)

A

Kerberos, TLS/SSL, PKU2U, NTLM

50
Q

A full disk encryption software developed for business oriented versions of Windows by Microsoft that can encrypt the entire disk and is transparent to users

A

BitLocker

51
Q

What are the 3 requirements for Bitlocker

A
  1. A Trusted Platform Module (TPM)
    or
  2. An external USB key to store the encrypted keys
  3. A hard drive with 2 volumes
52
Q

BitLocker software is based on the __________ and uses a _______ encryption key

A

Advanced Encryption Standard; 128 Bit

53
Q

Starting with Windows Vista SP1, BitLocker can be used to _________

A

encrypt internal hard disk volumes other than the system drive

54
Q

In Windows 7 and later versions, BitLocker functionality is extended to external USB drives (including flash drives) with _____________

A

BitLocker to Go

55
Q

_______ is offered by business editions of Windows and can be used to protect sensitive data files and temporary files and can be applied to individual files or folders

A

EFS (Encrypting File System)

56
Q

How can the CMOS password be removed?

A
  1. by resetting the CMOS. reset the CMOS by removing the CMOS battery for a few minutes
57
Q

A security measure that when enabled, it prompts the user to enter a password for the hard drive when the computer is first booted

A

HDD password

58
Q

To enable the recovery of EFS encrypted files in the event that Windows cannot start, you should export the user’s ________

A

EFS Security key

59
Q

How to set password policy that require the user change password periodically

A

Computer Configuration> Windows Settings> Security Options

60
Q

How to set policy that inform in advance that passwords are about to expire, require complex password, prevent old password from being used, or require a minimum password length

A

Computer Configuration> Windows Settings>Account Policies> Password Policy

61
Q

How to set policy to have user wait a certain # of minutes after unsuccessful log in attempts to log in again

A

Computer Configuration> Windows Settings>Account Policies> Account Lockout Policy

62
Q

5 account management settings that can enhance security

A
  1. restricting user permissions
  2. login time restrictions
  3. disabling guest account
  4. failed attempts lockout
  5. timeout/screen lock
63
Q

When you ___________ an optical disc or USB drive wont automatically start its autorun application and any embedded malware wont have a chance to infect the system before you can scan the media

A

disable autorun

64
Q

How do you turn off Autorun in Windows Vista/7/8/8.1/10

A

open the autoplay applet in control panel, clear the Use Autoplay for all media a devices and select save

65
Q

How do you turn off Autorun/autoplay in Windows 8/8.1

A

search for “autoplay settings” and clock it; in the pc and devices menu, move the Use AutoPlay for all media and devices slider to off

66
Q

What patch/ update management system is uses for OS, Windows and Linux

A

OS X- OS X Server’s Software update service
Windows- Microsoft’s Window Server Update Services (WSUS)
Linux- several but Yellowdog Updater Modifies is popular

67
Q

If ___________ is check marked, and a user accesses a website or application that requires a secure certificate, the credentials are stored on the device

A

use secure credentials

68
Q

By default, secure credentials are ________ after a session is over

A

dropped

69
Q

________ is able to secure, monitor, manage, and support multiple different mobile devices across the enterprise

A

Mobile Device Managment

70
Q

An ____________ is used to receive or generate authentication codes for one o f more apps or services

A

authenticator application

71
Q

Apple does not include a firewall because the design of iOS uses a feature called _______ that runs apps in separate protected space

A

sandboxing

72
Q

5 profile security requirements for security devices:

A
  1. specifying approved devices and OS versions
  2. requiring passwords and lock screens
  3. device encryption
  4. support issues
  5. when and how to remove company info when an employees leaves the organization
73
Q

5 types of physical destruction methods

A
  1. shredder (recommended for optical media)
  2. drill/hammer
  3. electromagnetic (degaussing) (best method)
  4. incineration
  5. certificate of destruction
74
Q

_____ is a quick format that only clears the root folder; the remainder of the data on the disk can be recovered until it is overwritten

A

standard format

75
Q

______ is performed by the drive manufacturer before the drive is shipped and cannot be performed in the field

A

low level format

76
Q

____ is writing on the hard disk or SSD’s data area with zeros; data could still be recovered

A

overwrite

77
Q

To assure the complete destruction of data on a storage device, it must be overwritten. Name 2 programs that exceed data destruction standards.

A
  1. DoD 5220.22-M (7 passes)

2. Peter Gutman’s 35 pass max security method