Implementing System Security Flashcards
Which security measure would protect hard disk contents even if server hard disks were physically stolen?
NTFS permissions
Power-on password
Encryption
Encryption
Encryption is the best answer, because NTFS permissions, power-on password, and complex passwords are all meaningless when someone gains physical access to hard disks
Trinity’s user account is mistakenly deleted when she goes on a three-month maternity leave. When she returns, a new account with appropriate NTFS permissions is created for her. When she tries to open her old files, she keeps getting “Access Denied” messages. What is the problem?
Trinity does not have proper NTFS permissions.
Trinity’s new user account has a different SID than her old one.
Trinity’s files are encrypted with her old account.
Trinity’s files are encrypted with her old account.
Encrypting File System (EFS) encrypts files and folders using keys that are unique to the user. Newly created user accounts, even with the same name, will not use the same keys, which means decryption will not occur. A recovery agent is required to decrypt Trinity’s files
Nate has been using his work e-mail address when surfing the Web and filling in forms on various web sites. To which potential problem has Nate exposed himself?
Spam
Phishing
SQL injection
Spam
Despite perhaps being illegal (this is currently a legal gray area), there is money to be made in providing valid e-mail addresses to spammers and also in spammers sending unsolicited advertisements to those e-mail addresses. Spam filters can reduce the amount of spam showing up in mailboxes
You are a server virtualization consultant for Not Really There, Inc. During a planning meeting with a client, the issue of virtual machine point-in-time snapshots comes up. You recommend careful use of snapshots because of the security ramifications. What is your concern?
Snapshots can consume a large amount of disk space.
Invoked snapshots will mean that the virtual machine is temporarily unavailable.
Invoked snapshots will have fewer patch updates than the currently running virtual machine.
Invoked snapshots will have fewer patch updates than the currently running virtual machine.
Reverting a running virtual machine to an older snapshot could mean going back to a point in time before critical patches or virus scanning updates were applied, thus rendering your virtual machine vulnerable
What can be done to harden a mobile, handheld device? (Choose two.)
Disable Wi-Fi.
Ensure that it is used only in physically secured areas.
Set Bluetooth discovery to disabled.
Enable screen lock.
Set Bluetooth discovery to disabled.
Enable screen lock.
Bluetooth discovery mode makes it possible for anybody within range (10 meters) to see and potentially connect to the mobile device. Screen lock is essential to secure mobile devices; a password or fingerprint scan is used to unlock the screen and make the device usable
A private medical practice hires you to determine the feasibility of cloud computing, whereby storage of e-mail and medical applications, as well as patient information, would be hosted by an Internet provider. You are asked to identify possible security issues. (Choose two.)
Data is not stored locally but is instead stored on the provider’s premises, where other businesses also have access to cloud computing services.
HTTPS will be used to access remote services.
Should the provider be served a subpoena, the possibility of full data disclosure exists.
Data will be encrypted in transit as well as when stored.
Data is not stored locally but is instead stored on the provider’s premises, where other businesses also have access to cloud computing services.
Should the provider be served a subpoena, the possibility of full data disclosure exists.
Because there are many customers sharing the same cloud computing services, it is reasonable to approach the issue of data storage cautiously. Third-party audit findings may dispel or confirm these fears. Depending on the provider’s geographic location, different laws may apply to whether data hosted by the provider can legally be disclosed
Which option will protect employee laptops when they travel and connect to wireless networks?
Personal firewall software
MAC address filtering
Virtualization
Personal firewall software
Personal firewall software could be configured to prevent all inbound network traffic, which also prevents its discovery on a wired or wireless network
What can be done to ensure the confidentiality of sensitive data copied to USB flash drives?
File hash
Encryption
NTFS permissions
Encryption
Encrypting USB flash drives prevents unauthorized parties from viewing the data. Stored data (data at rest) encryption protects data while it is not in use. Some drives are self-encrypting drives (SED), which use their own circuitry to transparently encrypt and decrypt data
Which standard is a firmware solution for drive encryption?
TPM
DLP
EFS
TPM
Trusted Platform Module (TPM) chips can store cryptographic keys or certificates used to encrypt and decrypt drive contents, otherwise called full disk encryption (FDE). If the drive were moved to another computer (even one with TPM), the drive would remain encrypted and inaccessible
What can be done to protect data after a handheld device is lost or stolen?
Execute a remote wipe.
Enable screen lock.
Disable Bluetooth discovery.
Execute a remote wipe.
Remote wipe is an option administrators can exercise to wipe the contents of a handheld device remotely
How can the specific location of a mobile device be tracked?
IP address
MAC address
GPS
GPS
GPS is a common feature in mobile devices that provides coordinates (longitude and latitude) for geographic tracking
What type of software filters unsolicited junk e-mail?
Anti-spam
Antivirus
Antispyware
Anti-spam
Spam is unsolicited junk e-mail. Anti-spam software attempts to filter out these messages, but it sometimes flags legitimate messages as spam
What type of software works against the collection of personal information?
Anti-spam
Antivirus
Antispyware
Antispyware
Spyware gathers personal information and computer usage habits without user knowledge
Which of the following best protects against operating system defects?
Firewall software
Encryption
Patching
Patching
Patching addresses specific operating system defects
What is the best way to prevent laptop theft?
GPS
Cable lock
Host-based firewall
Cable lock
A cable lock is a steel cable designed to secure a laptop to a secure object, such as a desk
A server administrator must adhere to legislation that states that financial data must be kept secure in the event of a physical security breach. What practices will ensure that the administrator complies with the law? (Choose two.)
Applying NTFS permissions
Storing backup tapes in a safe
Encrypting server hard disks
Storing backup tapes in a locked cabinet
Storing backup tapes in a safe
Encrypting server hard disks
In the event of a physical security breach, data will be kept secure in a safe. If server hard disks are stolen, encryption will ensure that data cannot be decrypted by unauthorized parties
What type of software examines application behavior, logs, and events for suspicious activity?
NIDS
Host-based firewall
HIDS
HIDS
Host-based intrusion detection system (HIDS) software monitors applications, logs, and events for suspicious activity
A database administrator requests a method by which malicious activity against a Microsoft SQL Server database server can be detected. All network traffic to the database server is encrypted. What solution should you recommend?
HIDS
NIDS
IPSec
HIDS
Host-based intrusion detection systems (HIDS) are application specific (such as to an SQL Server database). Databases can also benefit from encryption. Encryption presents no problems, since HIDS runs on the target computer
Which of the following are true regarding virtualization? (Choose two.)
Each virtual machine has one or more unique MAC addresses.
Virtual machine operating systems do not need to be patched.
Virtual machines running on the same physical host can belong to different VLANs.
A security compromise of one virtual machine means all virtual machines on the physical host are compromised.
Each virtual machine has one or more unique MAC addresses.
Virtual machines running on the same physical host can belong to different VLANs.
Each virtual machine does have a unique MAC address that is configurable by the virtual machine administrator. Virtual machines running on the same host can connect to different VLANs (physical or internal); this is simply a virtual network configuration setting
Cloud computing offers which benefits? (Choose two.)
Simple scalability
Fewer hardware purchases
Better encryption
Local data storage
No requirement for antivirus software
Simple scalability
Fewer hardware purchases
Scalability with cloud computing is simple because a third party takes care of hardware, software, software licensing, and so on. Because a third party is hosting some (or all) of your IT services, you will require fewer hardware resources