Chapter 28 Review: Securing Computers Flashcards
What type of attack is represented by a hacker changing their MAC address to match the server, causing the router to adjust MAC address tables accordingly?
Address spoofing
What type of network matches the following firewall settings?
Enables you to share resources, discover other devices, and allow other devices to discover your computer
Private network
What type of network matches the following firewall settings?
Prevents your computer from sharing and disables all discovery protocols
Guest or Public Network
What type of network matches the following firewall settings?
The controller on the network tells your machine what it can and cannot share
Domain Network
Laptops are easily stolen. One of the easiest ways to physically protect your laptop is with a _______
Cable lock
A type of virus that changes its signature to varied, but operational copies of itself to prevent detection is a _____ virus
Polymorph
A user logs in with a user name and password, and then a numeric key on a fob he possesses. What type of authentication is this?
Two factor authentication
A _____ is carried around by a user and contains a series of numbers that changes from time to time that can be used to access a secure location
Security Token
_____ is when your computer is locked or your data is encrypted until you pay a certain amount of money to a hacker
Ransomware
The _______ states that user accounts should have permission to access only the resources they need and no more
Principle of least privilige
What type of malware is this?
Often hides until it can be activated by human action, possibly stealing information
Virus
What type of malware is this?
Program that takes advantage of very low level operating system functions to hide itself
Rootkit
What type of malware is this?
Replicates on its own through hardware or through networks
Worm
What type of malware is this?
A network of infected computers under the control of a person or a group
Botnet
What type of malware is this?
Encrypts data on a hard drive and then demands money to decrypt the data
Ransomware
What type of malware is this?
Malware that appears to be something beneficial but usually has evil intent
Trojan Horse
A _____ protects an internal network from unauthorized access to and from the Internet by hiding addresses and blocking ports
Firewall
What kind of device can stop an attack while it’s happening, offers VPN and load balancing support, and includes an anti virus solution?
UTM (Unified Threat Management)
Local Security policy works great for individual systems, but if you want to apply the same settings to more than one PC on your network, you’re better off using ______ for more granular control over your network clients
Group Policy
Some attacks take advantage of human shortcomings to gain access that should otherwise be denied. What type of attack is this?
Social engineering
A man in the middle trap is often used to combat what form of infiltration?
Tailgaiting
A fingerprint scanner would use what type of factor to establish identity?
Inherence factor (something you are)
What is the order of the best practice for malware removal according to 902 exam standards?
- Identify malware symptoms
- Quarantine infected system
- Disable system restore (Windows)
- Remediate infected systems
- Schedule scans and run updates
- Enable system restore and create a new restore point
- Educate end user
A dictionary attack is a form of _______ attack which essentially guesses every word in a dictionary
Brute force
A security hole is often found in software after its release and can be unknown by the developer. The security hole may be exploited by an attacker before the developer can fix it. This is known as a ______ attack
Zero day
What is the most secure W-Fi encryption we have today?
WPA2
What is like a virus, but does not require a host application to be transported, and is self contained and can reproduce on its own?
Worm