Chapter 5 Securing Hosts and Data Flashcards

1
Q

____ is the practice of making an operating system (OS) or application more secure from its default installation.

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ helps eliminate vulnerabilities from default configurations, misconfigurations, and weak configurations.

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe least functionality

A

A core security principle stating that systems should be deployed with the least amount of applications, services, and protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ____ is an access point to an application or service that bypasses normal security.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or false: A system or application default account and default password does not need to be changed.

A

False

Default accounts and default passwords should always be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Windows and Apple operating systems are _____ source software, meaning that the underlying code is not freely available to the public.

A

Closed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Linux and Unix operating systems are ____ source software, meaning that it is freely available to the public.

A

Open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify three other locations where OSs operate

A

Kiosks
Network
Appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a kiosk?

A

A kiosk is a small structure in an open area used to sell something, provide information, or display advertisements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To create a non-persistent operating system on a computer you can use a ___

A

Live boot media

Ex. DISA uses BootMe that authorized DoD users can use to run an operating system on almost any computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a non-persistent operating system?

A

One that disappears when users turn off the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a common method of deploying systems?

A

Creating a master image with a secure configuration, and then deploy the image to multiple systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a trusted operating system?

A

One that meets a set of predetermined requirements with a heavy emphasis on authentication and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the overall goal of a trusted operating system?

A

To ensure that only authorized personnel can access data based on their permissions. It also prevents any modifications and movement of data by unauthorized entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An ____ is a snapshot of a single system that administrators deploy to multiple other systems.

A

Image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two important benefits of imaging?

A
  1. It creates a secure starting point.

2. It reduces cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or false: You can convert an image to a virtual system

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A ____ is a known starting point and organizations commonly use them to provide known starting points for systems.

A

Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: Admins can use an MS security template to import to a GPO and then apply to systems within a domain

A

True
Some orgs deploy a master image to all systems and then use the security templates to automatically apply different security settings to different groups of systems based on their security needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

___ security configuration is a common security issue

A

Weak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or False: One of the primary benefits of secure baselines is that they improve the overall security posture of systems

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identify the three steps for the use of baselines

A
  1. Initial baseline configuration
  2. Integrity measurements for baseline deviation
  3. Remediation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

____ ensures that systems and applications stay up to date with current patches.

A

Patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

One of the most efficient ways to reduce operating system and application vulnerabilities is ____ because it protects systems from known vulnerabilities.

A

Patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

True or False: Patch management does not include a group of methodologies and processes of identifying, downloading, testing, deploying, and verifying patches.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does SCCM stand for and what is it?

A

System Center Configuration Manager

It is a systems management tool used for many purposes like patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

____ defines the process for any type of system modifications or upgrades, including changes to applications.

A

Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are two key goals of Change Management?

A
  1. To ensure changes to IT systems do not result in unintended outages
  2. To provide an accounting structure or method to document all changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A common security issue is the use of _______ software, which can cause many different problems.

A

Unauthorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The most common problem of using unauthorized software often includes ____

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Aside from malware, additional problems of using unauthorized software are _____ and ____

A

Application support and license compliance violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

True or False: An organization can be susceptible to fines and penalties if they breach license agreements.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

______ is a list of applications authorized to run on a system

A

Application whitelist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

____ is a list of applications the system blocks

A

Application blacklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

____ ______ ______ in MS Group Policy can be used for both whitelisting and blacklisting computers within a domain.

A

Software Restriction Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What does MDM stand for?

A

Mobile Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

True or False: an MDM can whitelist and blacklist applications on mobile devices

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

_______ is the use of an isolated area on a system and it is often used for testing.

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

True or False: Sandboxing cannot be used by admins and security professionals to test various security controls before deploying them to a live production network.

A

False

It can be used to test security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

True or False: Virtualized sandboxes are useful for testing patches

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The ____ command in Linux is used to change the root directory for an application, effectively isolating it.

A

Chroot

Note: Chroot jail is a term when using chroot to isolate a sandbox in a test directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

List the different types of environments in a secure staging environment

A
  1. Development - used by developers to create and modify code
  2. Test - used by developers to unit test and identify any bugs or errors. Typically does not simulate a full production environment
  3. Staging - simulates the production environment and is used for late stage testing.
  4. Production - Final product which includes everything needed to support the application and allow customers and others to use it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A ____ ____ includes all the elements required to produce a product.

A

Supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does EMI stand for and what is it?

A

Electromagnetic interference
Interference of transmitted signals over wires that comes from sources such as motors, power lines, and fluorescent lights and can prevented from shielding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What does EMP stand for and what is it?

A

Electromagnetic pulse
A short burst of electromagnetic energy. It can come from a wide assortment of sources and can cause damage to computing equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are some sources of EMP?

A
  1. Electrostatic discharge (ESD).
  2. Lightning
  3. Military weapons such as nuclear explosions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What does FDE stand for and what is it?

A

Full disk encryption

When an entire disk is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What does SED stand for and what is it?

A

Self-Encrypting Drives

A drive that includes hardware and software to encrypt all data on the drive and securely store the encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What does BIOS stand for and what is it?

A

Basic Input/Output System

Firmware which provides a computer with basic instructions on how to start.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What does UEFI stand for and what is it?

A

Unified Extensible Firmware Interface

Firmware similar to BIOS with enhanced features such as booting from larger disks and designed to be CPU independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What process upgrades a BIOS or UEFI and how does it work?

A

Flashing overwrites the software within the BIOS/UEFI chip with newer software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A ____ is a hardware chip on the computer’s motherboard that stores cryptographic keys. It keeps hard drives locked, or sealed, until the system completes a system verification and authentication process.

A

Trusted Platform Module (TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A ____ supports secure boot and attestation processes

A

Trusted Platform Module

54
Q

True or False: If a TPM detects that files have been modified it will block the boot process to protect the data on the drive

A

True

55
Q

What is a remote attestation process?

A

A process that uses a separate system (not TPM) to check the boot files

56
Q

Rivest Shamir Adleman (RSA) private keys are used for what form of encryption?

A

Asymmetric

57
Q

True or False: A hardware root of trust is formed where a private key is matched with a public key

A

True

58
Q

True or False: Another term for hardware root of trust is secure starting point

A

True

59
Q

What does HSM stand for and what is it?

A

Hardware Security Module
It is a security device that can be added to a system to manage, generate, and securely store cryptographic keys. Similar to a TPM

60
Q

What is a noteworthy difference between HSM and TPM?

A

HSMs are removable or external devices

61
Q

_____ _____ refers to accessing computing resources via a different location than your local computer.

A

Cloud computing

62
Q

Web-based e-mail is what type of could computing service?

A

Software as a Service (SaaS)

63
Q

What is Amazon’s hosted cloud services referred to as?

A

Amazon EC2 - Elastic Compute Cloud

Note: It combines virtualization with cloud computing and they currently provide a wide variety of services

64
Q

What other options do organizations have aside from cloud hosted services?

A
  1. On-premise - all resources owned, operated, and maintained within the org’s building(s)
  2. Hosted - An org can rent access to resources from a specific org. However in most cases, hosted services are somewhere within the cloud
65
Q

What does SaaS stand for and what is it?

A

Software as a Service

A software or application provided to users over a network i.e. internet Generally accessed via a web browser

66
Q

What does PaaS stand for and what is it?

A

Platform as a Service
Provides customers with a pre-configured computing platform they can use as needed. Referred to by many providers as a managed hardware solution.

67
Q

What does IaaS stand for and what is it?

A

Infrastructure as a Service
Allows an organization to outsource its equipment requirements, including the hardware and all support operations. The provider owns the equipment, houses it in its data center, and performs all required hardware maintenance. The customer essentially rents access to the equipment and often pays on a per-use basis. Often referred to as a self-managed solution.

68
Q

What does CSP stand for?

A

Cloud Service Provider

69
Q

When comparing CSP and customer responsibilities for SaaS, PaaS, and IaaS, explain the difference in security responsibilities

A

SaaS the CSP has more responsibility than the customer.
IaaS the customer has more responsibility than the CSP.
PaaS there is closer to equal responsibility

70
Q

What is Security as a Service?

A

Any services provided via the cloud that provide security services, and is commonly viewed as a subset of SaaS.
Example is of licensed anti-virus where each individual installs with their own license and the anti-virus is automatically updated periodically

71
Q

What does CASB stand for and what is it?

A

Cloud access security broker
A software tool or service deployed between an organization’s network and the cloud provider. It provides Security as a Service by monitoring traffic and enforcing security policies.

72
Q

What are the four categories of cloud deployment models?

A
  1. Public
  2. Private
  3. Community
  4. Hybrid
73
Q

____ are available from third-party companies, such as Amazon, Google, Microsoft, and Apple. They provide similar services to anyone willing to pay for them.

A

Public

74
Q

____ is set up for specific organizations.

A

Private

75
Q

Those with shared concerns (such as goals, security, requirements or compliance considerations) can share cloud resources within a _____.

A

Community cloud

76
Q

A ____ is a combination of two or more clouds.

A

Hybrid cloud

77
Q

____ is when the organization purchases devices and issues them to employees

A

Corporate-owned

78
Q

What does COPE stand for and what is it?

A

Corporate-owned, personally enabled
Deployment model where the employees are free to use the device as if it was their own personal device. Not restricted to only work related activities.

79
Q

What does BYOD stand for and what is it?

A

Bring your own device

Where an employee can use his/her own personal mobile device and connect to the employer’s network

80
Q

What does CYOD stand for and what is it?

A

Choose your own device

Organization identifies a list of acceptable mobile devices that employees can purchase and bring to work.

81
Q

What does VDI stand for and what is it?

A

Virtual desktop infrastructure

Ability to access the VDI from users mobile device

82
Q

What is ANT and ANT+?

A

Proprietary wireless protocols used by some mobile devices. Many sports and fitness sensors collect data on users and use ANT to send the data to a mobile device application i.e. fitbit

83
Q

What are some MDM concepts with respect to mobile devices?

A
  1. Application management
  2. Full device encryption
  3. Storage segmentation
  4. Content management
  5. Containerization
  6. Passwords and PINs
  7. Biometrics
  8. Screen locks
  9. Remote wipe
84
Q

How are biometrics used with mobile devices?

A

Used for authentication and can be managed via MDM

85
Q

What is a remote wipe?

A

MDM can send a remote signal to a device and wipe/erase all of the data including cached data

86
Q

What is containerization for mobile devices?

A

Isolating an application to run in a container which protects the application and its data

87
Q

What is storage segmentation for mobile devices?

A

Separate segments created on mobile device to protect data

88
Q

What is geolocation?

A

Using GPS to identify the location of a device

89
Q

What is geofencing?

A

Using GPS to create a virtual fence or geographic boundary. Apps can be configured to run only within a virtual fence.

90
Q

What is GPS tagging aka geotagging?

A

When geographical information is added to files such as pictures when posting on social media.

91
Q

What is context-aware authentication?

A

Uses multiple elements to authenticate a user and a mobile device. Can include the user’s identity, geolocation, verification that the device is within a geofence, time of day, and type of device.

92
Q

What are push notification services?

A

Services which send messages to mobile devices from apps.

93
Q

_____ refers to removing all software restrictions from an Apple device.

A

Jailbreaking

Often done by users in order to install software from third-party sources

94
Q

____ is the process of modifying an Android device to give the user full administrator access to the device

A

Rooting

95
Q

Mobile devices typically have the OS stored in ______ memory

A

Onboard

96
Q

What does OTA stand for with regards to mobile devices?

A

Over the air

97
Q

____ is the process of copying an application package in the Application Packet Kit (APK) format to the device and then activating it

A

Sideloading

98
Q

True or False: Overwriting the firmware on an Android device with customer firmware is another way to root an Android device

A

True

99
Q

What are two primary risks with text messaging?

A
  1. Messages sent in cleartext allowing the information to be intercepted and read by others
  2. With MMS attackers can gain remote code execution privileges on the user’s phone
100
Q

What does SMS stand for?

A

Short Message Service

101
Q

What does MMS stand for?

A

Multimedia Message Service

102
Q

How does disabling the camera and recording microphone on a mobile device improve security?

A

Reduces the risk of attackers being able to use those hardware features to infiltrate and spy

103
Q

______ allows you to share one device’s internet connection with other devices

A

Tethering

104
Q

_____ ____ is a standard that allows devices to connect without a wireless access point, or wireless router.

A

Wi-Fi direct

105
Q

True or False: An MDM cannot block access to devices using tethering or Wi-Fi direct to access the internet.

A

False

MDMs can block tethering and wi-fi direct connections

106
Q

_____ ____ is any device that has a dedicated function and uses a computer system to perform that function

A

Embedded system

107
Q

____ ____ includes Internet-connected devices, such as wireless thermostats, lighting, coffee makers, etc.

A

Home automation

108
Q

____ is an integrated circuit that includes all the functionality of a computing system within the hardware. It typically includes an application contained within onboard memory.

A

System on Chip (SoC)

109
Q

________ typically refers to systems within large facilities such as power plants or water treatment facilities.

A

Industry Controlled System (ICS)
Controlled by SCADA systems and best practice is for them to be within isolated networks i.e. VLAN that do not have access to the internet. If connected to corporate network are often protected by NIPS to block unwanted traffic

110
Q

____ is an operating system that reacts to input within a specific time.

A

Real-Time Operating System (RTOS)

111
Q

What does HVAC stand for?

A

Heating, Ventilating, and Air Conditioning

112
Q

What are some special-purpose devices contain embedded systems?

A
  1. Medical devices
  2. Automotive vehicles
  3. Unmanned aerial vehicles (UAV)
113
Q

What are some forms of software based encryption?

A
  1. MS Net Technology File System (NTFS) which allows to configure permissions with ACLs
  2. Database encryption - either entire database or specific datasets
114
Q

What are the primary methods of protecting the confidentiality of data?

A
  1. Encryption

2. Strong access controls

115
Q

What does EFS stand for?

A

Encrypting File System

116
Q

What is a benefit of file and folder level encryption?

A

Ability to encrypt individual files without encrypting an entire disk

117
Q

True or False: A common security issue with permissions is giving users more permissions than they need

A

True

118
Q

When does an access violation occur?

A

When a user accesses materials that they shouldn’t

119
Q

What are three primary entities that you can assign permissions to within Linux?

A
  1. Owner - User who owns the file or directory
  2. Group - Contains multiple users. A group can be an owner as well
  3. Others - Everyone else outside of Owner and Group. These permissions do not override those of Owner and Group
120
Q

What are the basic Linux permissions?

A
  1. Read (r/4) - allows to view the file
  2. Write (w/2) - allows to modify the file
  3. Execute (x/1) - allows to run the file
121
Q

True or False: With Linux file permissions, unassigned permissions are represented as an asterisk

A

False

Unassigned permissions are represented as a dash

122
Q

What does FACL stand for?

A

File access control list

123
Q

What command do linux admins use to change permissions on files?

A

chmod

Stands for change mode

124
Q

What is an example of using the chmod command?

A

chmod 755 success.exe
Owner has rwx
Group has rx
Others has rx

125
Q

What are the basic Windows permissions?

A
  1. Read - users can view
  2. Read and execute - users can view and run/execute
  3. Write - Users can create new and modify existing
  4. Modify - users can modify permissions
126
Q

True or False: A DLP solution can prevent a user from copying or printing files with specific content

A

True

Some DLP solutions will also log and alert of the activity

127
Q

____ is the unauthorized transfer of data outside an organization and is a significant concern.

A

Data exfiltration

128
Q

True or False: DLPs can scan the text of all emails including zipped files which it unzips and scans

A

True

129
Q

True or False: Many organizations classify and label data using terms such as Confidential, Private, and Proprietary

A

True

130
Q

What does PII stand for?

A

Personally Identifiable Information

131
Q

What does PHI stand for?

A

Protected Health Information