Domain 2 Security Flashcards

1
Q

Wireless Encryption

A

data is being sent over the air and anyone can listen

Encryption makes the signal impossible to understand without the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WEP

A

Wired equivalent privacy
vulnerabilities / Do not use
often uses a hexadecimal key for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WPA

A

short term solution for WEP
its legacy/ do not use
uses TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WPA2

A

uses CCMP block cipher mode / Counter Mode and Cipher Block Chaining

data confidentiality with AES encryption

WPA2- Personal / pre-shared key

WPA2 - Enterprise / authentication server, no shared key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA3

A

uses GCMP block cipher mode / Galois/Counter Mode Protocol
stronger than WPA2, fixes WPA2 PSK has issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

Radius : remote authentication dial-in user service, talk to VPNS

TACAS+ : terminal access control access control system
Connect to network equipment, usually a Cisco device

Kerberos : usually a Microsoft network, supports SSO when logging into a domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication

A

single-factor = password
Multifactor = password and certificate or captive portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

any software initially designed to cause disruption to computer server without the user’s knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

code that runs on a computer without the user’s knowledge
typically attached to an executable which allows it to replicate
spread using email, websites, and/or network file sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worm

A

similar to a virus but it will self replicates
exploits network vulnerabilities to spread and infect more hosts
spread through emails, websites, and network shares
doesn’t need human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ransomware

A

restricts the use of a computer until the user pays a ransom, often encrypts the data and holds the key to unlock it ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan

A

appears to perform a desired function, but actually does something malicious
used to deliver other malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

software used to spy on the user

can be difficult to detect

examples include keyloggers, rootkits, system monitors, and tracking cookies

can be used with adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keylogger

A

form of spyware

used to record keystrokes, personal info/passwords

info can be sent over network or stored locally for later pickup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rootkit

A

designed to hide and give attackers access to the computer

often used to hide other types of malware or provide ongoing access

difficult to detect with traditional malware scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Botnet

A

network of infected devices

usually not easy to tell if you are infected

bot software waits for instructions from a controlling device

often used to perform DDoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Boot Sector Virus

A

will infect the system boot partition or the master boot record

a type of malware that runs as soon as your OS is booted, not after, therefore making it harder for anti-malware to prevent

secure boot, which is included in UEFI BIOS, should prevent unsigned software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cryptominers

A

malware that unknowingly uses your computer, to complete tasks that earn the hacker cryptocurrency

mining cryptocurrency uses a lot of CPU resources, and attackers typically try to gain access to multiple CPUs

a spoke in your CPU utilization could be a warning sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Windows Recovery ENvironment

A

windows recovery environment gives you complete control of your system before it even starts

be careful to know what you’re doing; the environment contains all the files related to your OS

can remove malicious software before it boots up

can repair the file system boot sector or master boot record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Removal Methods

A

antivirus/antimalware
software usually quarantines files before removal , make sure its updated, make sure its running in real time

Completely reinstall the OS
Restore from backup, make sure it’s a clean backup
manually install the OS, make sure you have your data backed up first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An ounce of Prevention

A

End user education, don’t go to sketchy websites, don’t plug in flash drives you found on the street, identify spam/ malicious messages, anti-phishing training

Software firewalls
Windows firewall is built into the Windows OS and enabled by default
macOS/Linux may have packages installed but not enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Social Engineering

A

tricking users into giving out confidential information or performing other actions such as downloading malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Phishing

A

used to try to hook users often through links in email or websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Spear Phishing (phishing)

A

targets a specific individual or institution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Whaling (phishing)

A

targets someone at a high level such as a CEO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Vishing Attack

A

like phishing but it is done over the phone or voicemail

trusted companies will not ask for sensitive information in email or phone calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Shoulder surfing

A

attacker looks over the shoulder of a user to obtain information

Can be done with phone cameras as well, use a privacy screen, never leave password/PIN info visible, lock or log off computers when not using them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Tailgating

A

attacker follows closely behind an authorized user into a secure area

turnstiles and access control vestibules are effective measures to prevent this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Impersonation

A

attacker pretends to be an authorized employee

convince user to give up info or perform a task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Dumpster diving

A

Attacker looks through the trash/recycling for sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Evil Twin

A

wireless form of a phishing attack

attacker will create a wireless access point with the same or similar SSID of an existing network

always use HTTPS and a VPN to protect yourself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Denial of Service (DoS) attacks

A

attacker overloads target with information causing it to fail

Distributed DoS (DDoS) uses an army of devices to perform DoS attack
devices in a botnet may be
referred to as zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Zero-Day Exploits

A

many applications have vulnerabilities that jsut haven’t been found yet

ethical hackers find exploits and report them to companies

an attack using a previously unknown exploit is called a zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Spoofing

A

pretending you are something/someone you aren’t

Email address, MAC address, DNS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

On-Path Attack

A

traffic is redirected through a middleman device

you may have no idea information is being siphoned

use encrypted protocols to protect against this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Password Attacks

A

most password attacks don’t happen at the login page

attackers gain access to the password file or database
contains passwords in a hashed format-not clear text

attackers then created hased versions of password guesses, then compare them to the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Brute force attack ( password attack)

A

attackers attempt every combination of viable characters, takes a long time, often not viable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Dictionary attack ( password attack)

A

attackers use a list of common words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Rainbow table attack ( password attacks)

A

attackers use an optimized list of pre-hashed values

significantly faster compared to other attacks

not viable if has is salted random values are added

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Insider Threat

A

Former and current employees have institutional knowledge that is valuable to attackers

  • attacks can get a better idea of
    when, where, and how to attack
  • this can earn the insider a lof
    money

some attackers try to get hired by the company they intend to attack, thus giving them even more access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

SQL Injection

A

Websites typically have a database to store information related to the site
- SQL (Structured Query Language)
is a programming language used
to talk to the database

AN improperly formatted website could allow an attacker to manipulate the SQL code and find information they shouldn’t have access to e.g. personal employee data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Cross-site Scripting (XSS)

A

an attack where information from one site is shared with the attackers

there is a common web application development error that allows malware to take advantage of JavaScript

keep your browser up to date and don’t click on any untrusted links

Input validations - make it so that users can’t put scripts into an input field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Non-Compliant Systems

A

systems who don’t comply with the Standard Operating Environment (SOE), are a major security concern for your network

Make sure devices are installing new OS updates, security patches, and anti-virus signatures
- non-compliant systes will warm
the users, and potentially lose
access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Unpatched Systems

A

windows release patches on the second Tuesday of every month

any device that is not patched is the weakest link on your network and that’s the device that attackers will target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Unprotected Systems

A

sometimes during troubleshooting, it might be necessary to disable some of your security features
- disabling the firewall
- disabling the antivirus

be sure to tur these on once you are done. never permanently disable security features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

EOL OSs

A

End of Life (EOL)
Manufacturer stops selling an OS, they might continue supporting the OS and release important security patches and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

End of Service Life ( EOSL)

A

Manufacture stops selling and stops supporting the OS
No more security patches and updates
At this point, you need to find an alternative solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

BYOD ( Bring Your Own Device)

A

Employees bring their own devices to use for company purposes, you must make sure that these devices meet your company’s security requirements

The MDM will help keep the data on the device separated, protected, and make sure that the device’s security is up-do-date

49
Q

Screen Locks

A

always use a screen lock
most secure is finger print
swipe lock is the worst one

50
Q

Locator/Remote Wipe

A

find my iPhone
Google Find My device

Features: make sound, lockout, remote wipe, or see location on map

Useful when the device is stolen/lost

51
Q

Mobile OS Patching/Updates

A

ensure your mobile device is patched and updated

52
Q

Full Device Encryption

A

data encryption is an option for Android and iphone data is encrypted by default

53
Q

Remove Backup Applications

A

backup/restore device to/from cloud
iCloud for apple
Google or manufacturer for Android

54
Q

Antinvirus/Antimalware

A

Malware and viruses are less of a problem on mobile devices

Antivirus/malware apps can be installed via App Store or Play Store

55
Q

Failed Login Attempts Restrictions

A

set via settings
can lockout user for a certain amount of time
can be set to initiate factory reset with enough failure

56
Q

Biometric Authentication

A

unlock screen lock
login to apps
use instead of passwords

56
Q

Firewall

A

3rd party apps are available from app stores

mobile phones normally don’t have firewalls

56
Q

Policies and Procedures

A

BYOD - Bring Your Own Device
may require the installation of management software

Corporate Owned
- typically managed through the installation of management software

Profile security requirements
-require all users to use screen locks, strong passwords, and mobile device wipe capabilites

57
Q

Low-level format

A

creates physical sectors-done at the factory

not recommended for users

can also mean an overwrite

57
Q

Internet of Things (IoT)

A

devices that are connected to your home or work network

57
Q

Physical Destrucstion

A

Industrial shedders
- ripe apart the drives

Drill
- drill holes into the drive

Hammer
-
Degaussing
- destroys the ability for magnetic
plate to hold information via
electromagnetic field

Incineration
-
ER2 will do this

58
Q

Standard Format - Regular

A

Sometimes it’s important to make sure that sensitive data is unable to be recovered

Overwrite
- Overwrite data with all 0’s
- Repeat 7 times for DoD
standards

Drive wipe

59
Q

Data Destruction and Disposal

A

responsibility to dispose of storage devices safely: data security and legal liability

performed on-site or by external company: external company will provide a certificate of destruction

60
Q

Standard Format - Quick Format

A

organizations may want to recycle/repurpose drives instead of destroying them

Quick Format (Windows)
- deletes partition table so OS
doesn’t understand contents
- savvy users could recover data
from platters

60
Q

Which wireless encryption uses TKIP

A

WPA

61
Q

Why do we need wireless encryption

A

to keep our data signal private

62
Q

WEP is safe to use, True or False

A

False

63
Q

Which authentication provides centralized triple A (AAA), particularly for remote access scenarios?

A

Radius, Remote authentication dial-in user service

centralized authentication, Radius servers talk to VPNs

64
Q

TACACS+

A

terminal access controller access

cisco device, equipment is connecting to quipment

65
Q

Kerberos

A

supports SSO when logging into a domain

66
Q

Not an area of centralized management in network environments

A

Administration

67
Q

Makes up an area of centralized management in network environments

A

Authorization
Accounting
Authentication

68
Q

You suspect someone is recording everything you type into the computer. What kind of malware are you dealing with?

A

Keylogger

69
Q

After downloading a game, you start getting random popups and your computer runs slowly. What type of malware is this?

A

Trojan

70
Q

You notice symptoms of a malware infection, but a malware scan does not find anything. What kind of malware is this?

A

Rootkit, will be scanned for but will change itself to look like the same thing

71
Q

A user’s pc has become inoperable and only shows a message asking for payment to unlock the computer. What is this?

A

Ransomware

72
Q

Cryptominer

A

is malware used to perform calculations in an effort to accumulate a cryptocurrency. Often uses extensive CPU cycles and causes performance issues on the system

73
Q

Botnet

A

a group of computers that are under the control of a third-party. Botnets can be used to provide large-scale distributed attacks

74
Q

An attacker is using every combination of letters, numbers, and special characters in an attempt to discover a user’s password. What would describe this attack type?

A

Brute Force

75
Q

An internal audit has found that asever in the DMZ appears to be infected with malware. The malware does not appear to be part of a file in the OS and the malware is started each time the system is started. What type of malware would be MOST likely found on this server?

A

Boot sector virus, a virus in the boot sector.

To stop this you would need to get into a preboot environment,

76
Q

You want to ensure that company data is secure in the event of a lost device. What method is best?

A

Bitlocker

77
Q

What does a strong password?

A

A strong password includes capital letters, lower case letters, symbols, and numbers

78
Q

You want to ensure users can’t edit BIOS configurations. What should you set?

A

Supervisor password

79
Q

Which of the following security precautions is most important?

Changing Default Credentials
Disabling Guest Account
Setting screen locks
Setting login attempts restictions

A

Changing default credentials

80
Q

An employee is leaving your organization. What should you do with their Active Directory acount?

A

Disable it

81
Q

A system administrator is troubleshooting an older application on a Windows 10 computer and needs to modify the UAC (User Account Control)process. What options would provide access to these settings?

A

User accounts, settings are contained in the COntril Panel’s user accounts applet

82
Q

System Information

A

provide information about a system’s hardware, components, and software environment

83
Q

A Windows 10 user is installing a new application that also installs a service. What permission will be required for this installation?

A

Administrator

84
Q

A business partner in a different country needs to access an internal company server during the very early morning hours. The internal firewall will limit the partner’s access to this single server. What would be the MOST important security task to perform on this server?

A

Install the latest OS patches, which will ensure that any known vulnerabilities are always removed before they could possibly be exploited

84
Q

An employee has modified the NTFS permissions on a local file share to provide read access to Everyone. However, users connecting from a different computer do not have access to the file. What is the reason for this issue?

A

Share permissions restrict access from remote devices

85
Q

Full device encryption

A

ensures that all of the information on the tablet cannot be viewed by anyone outside of the company, so if something was stolen or lost, all of the data on the device would remain private

86
Q

Firewall app

A

keep unauthorized users from accessing the tablet over the network

86
Q

Locator Application

A

provides the location of the device

87
Q
A
87
Q
A
88
Q
A
88
Q
A
89
Q
A
90
Q
A
91
Q
A
91
Q
A
92
Q
A
93
Q
A
93
Q
A
94
Q
A
95
Q
A
96
Q
A
97
Q
A
97
Q
A
98
Q
A
99
Q
A
100
Q
A
100
Q
A
100
Q
A
101
Q
A
102
Q
A
103
Q
A
104
Q
A