Exam 2.1 Flashcards
What is required for firmware and software in a secure boot process?
Each firmware and software that starts up must be checked to ensure it is approved.
What components are checked in a secure boot process?
In a secure boot, all system firmware, bootloaders, kernels, and other startup programs are checked.
What must happen for custom hardware, firmware, and software to pass a secure boot process?
Custom hardware, firmware, and software may not pass unless they are first approved by system vendors, such as Microsoft.
What does Windows OS do in a trusted boot process?
In a trusted boot, Windows OS checks each part of the boot process for problems before starting.
How does Trusted Boot continue from Secure Boot?
Trusted Boot picks up where Secure Boot stops by checking Windows 10 software for issues before loading it.
Does Trusted Boot require using a Microsoft OS?
Yes, Trusted Boot requires using a Microsoft OS.
What happens in a measured boot regarding the boot process and security checks?
In a measured boot, the computer’s firmware records the boot process, and the OS can send this record to a trusted server for security checks.
Which boot process provides the highest degree of security?
Measured boot provides the highest degree of security.
What is a potential drawback of using measured boot?
Measured boot could slow down the boot process.
What is needed after boot security is set for computer endpoints?
Once boot security is set, the computer endpoints need to be actively protected.
What functions can antivirus software perform on a computer?
Antivirus software can check a computer for viruses, monitor activity, and scan new documents for potential viruses
What are the typical options for handling a virus detected by antivirus software?
Options usually include cleaning the file, quarantining it, or deleting it.
What does antivirus software do in signature-based monitoring or static analysis?
Antivirus software scans files to match known virus patterns, a process known as string scanning.
What is wildcard scanning in antivirus software?
Wildcard scanning allows skipping bytes instead of needing an exact match
mismatches
allows some bytes in the string to be any value, no matter where they are.
What does heuristic monitoring (or dynamic analysis) look for in antivirus software?
looks for signs of a virus rather than matching patterns
What types of malware does antimalware protect against?
Antimalware protects against different kinds of malware, including ransomware, cryptomalware, and Trojans.
Bayesian filtering
antimalware technique
What does Bayesian filtering do with email messages?
Bayesian filtering sorts email messages into two groups: spam and non-spam.
How does a Bayesian filter determine if an email is spam or non-spam?
The Bayesian filter checks each word in an email and sees how often it appears in spam versus non-spam messages
How does a Bayesian filter evaluate the likelihood of an email being spam?
the Bayesian filter looks at the 15 most likely words to decide how likely the message is to be spam
What is HTTP used for on the web?
basic protocol for all data exchanges on the web.
What role does HTTP play in client-server communication?
HTTP is a client-server protocol where the client, like a web browser, sends requests to a web server
What is a limitation of the HTTP protocol?
One limitation of HTTP is that it is a stateless protocol
What does a stateful protocol do that a stateless protocol does not?
A stateful protocol remembers everything that happens between the browser and the server
What happens with a stateless protocol when the session ends?
it forgets what happened
What are three ways HTTP can mimic a stateful protocol?
- URL Extensions: Including state information in the URL.
- Hidden Form Fields: Sending state information in hidden form fields that are sent back to the server.
- Cookies: Storing user information in a file on the user’s computer, which is then retrieved later.
What is a first-party cookie?
A first-party cookie is created by the website the user is currently visiting.