Chapter 27 - Securing Computers Flashcards

1
Q

Man-in-the-Middle threat

A

a threat coming between a client and a server. Encryption helps protect against this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spoofing threat

A

taking on the likeness of something else such as email. Secured connections protect against this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dos threat is what?

A

Denial of Service(DoS). Bad request coming into a server causes it to stall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DDos threat is what?

A

Distributed Denial of Service(DDoS). Installing malware onto a bunch of computers turning them into Zombies and then the Zombies send thousand of bad request to bring down a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zero Day

A

A new version of a threat that no one has seen before.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Renamed system files

A

Are using phishy emails or request to rename files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Denied of things that you have access to.

A

Is another phishy sign of a security threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disappearing Files

A

Is another phishy sign of a security threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Three Levels of Physical Security

A
  1. Perimeter Security. 2. Locked Rooms. 3. Individual devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hash

A

Is your password turned into a string of letters and numbers using an encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Brute Force

A

Rarely used to crack a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dictionary Attack

A

Using a list of known or commonly used passwords to crack passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rainbow table

A

like dictionary but use tables of commonly used passwords and commonly used numbers in passwords to crack a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password practices/advice

A
  1. Make a long password using numbers, upper and lower case letters and special characters. 2. Password expiration change your password often like 30 to 90 days. 3. Screensavers. 4. Passwords for lock screens. 5. BIOS/UEFI passwords. 6. Passwords on everything. Use Multifactor Authentication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virus

A

is a very old term for malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

worm

A

first gen of malware that propagate via networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Malware

A

Pretty much all malware is a worm. Infestations manifest as browser redirection, application crashes, update failures, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Trojan Horse

A

Masquerades as benign programs, but carry a payload for later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Rootkit

A

Tries to hide in the boot section of your hard drive to find from the OS.

20
Q

Ransom ware

A

One of the biggest issues of malware today. Attacks or locks down your system in exchange for money.

21
Q

Rogue Antivirus

A

a virus downloaded from an location offering antivirus

22
Q

Botnet

A

a bunch of zombified computers, that are under the control of someone else.

23
Q

Keylogger

A

Recording a users a key logs or key strokes.

24
Q

Spyware

A

a piece of malware that’s spying on your system.

25
Q

Pop-ups

A

bad pop-ups that pop-up as a sperate window.

26
Q

Browser redirection

A

Getting routed to a different website when trying to go to a specific website.

27
Q

Security Alerts

A

OS security that notifies you of malware activity.

28
Q

Application Crashes

A

Another common issue of malware

29
Q

OS update failure

A

Updates of your OS fail. Malware preventing you to perform updates.

30
Q

Spam

A

Phishy emails from known email addresses. Like your getting phishy emails from your friends. Or you friends are getting phishy emails from you.

31
Q

Hijacked email

A

When your email is sending out phishy emails that you aren’t actually sending out.

32
Q

Automated Replies

A

Automated replies that sound phishy

33
Q

Best Practices for dealing with Malware

A
  1. No such thing as an antivirus program term is anti-malware. 2.
34
Q

Recovery Console.

A

Have a backup file. End-user Education, tech users what to look for.

35
Q

software firewall.

A

the Host/built in firewall.

36
Q

Secure DNS

A

Use a secure DNS to help prevent big companies taking your data.

37
Q

Encrypt your DNS request

A

Very secure DNS. configuring a public DNS server.

38
Q

Disable system restore.

A

Windows restores system restore.

39
Q

Phishing

A

could be email, a website

40
Q

EULA

A

describes what users can do with licensed software

41
Q

DRM

A

controls what users can do with some content

42
Q

Open-source

A

software enables users to change or modify the software.

43
Q

Incident Response

A
  1. Know your responsibility. 2. Identify the problem. 3. Keep chain of custody.
44
Q

Identify the problem

A

Report through the proper channels. Data/Device preservation. Use of documentation. Document changes

45
Q

Keep chain of custody

A

Tracking evidence, Document process.

46
Q

MSDS stands for what?

A

Materials Safety Data Sheet(MSDS).

47
Q

Temperature and Humidity Levels

A

Good to keep computer in good cool environments. And need proper ventilation.