James Adams Chapter 19 Flashcards
Low level format vs. standard format
Chapter 19 Page 936
Standard formats uses a systems format utility, which may not remove all of the data on a drive.
Low-level formats are typically accomplished in a factory and is much more reliable in removing all data.
Degaussing
Chapter 19 Page 938
Degaussing involves applying a strong magnetic field to destroy magnetic data.
What is a certificate of destruction?
Chapter 19 Page 939
These may be required for audit purposes. These certificates are usually handed out by the organization carrying out the destruction.
T/F?
Wireless networks in the 5ghz range are completely secure.
Chapter 19 Page 939
False. A wireless network is not and never will be secure.
If on a wireless network, CompTIA insists on changing static security keys how often?
Chapter 19 Page 939
Every 2-4 weeks.
T/F?
Wireless networks with limited security regularly broadcast their SSID.
Chapter 19 Page 940
True.
What are a few types of wireless encryptions?
Chapter 19 Page 940
WEP, WPA, WPA2…
What does disabling your SSID broadcast do?
Chapter 19 Page 940
This will stop the announcing of your network, it won’t show up in the list of available networks to anyone. The network can still be accessed if someone knows the SSID.
T/F?
Most APs offer the ability to turn on MAC filtering.
Chapter 19 Page 940
True, but it is off by default.
Why is antenna placement important?
Chapter 19 Page 941
Antenna placement/range may give others access to your network from further away, even outside of the building.
What does MAC filtering do?
Chapter 19 Page 942
MAC filtering limits access to the network to the MAC addresses that have been allowed to access it.
Can you disable ports to limit the amount of doors for an attacker to come through?
Chapter 19 Page 943
Yes.
NTFS tracks security in ACLs, what are ACLs?
Chapter 19 Page 943
Access control lists.
What are some actions for physical security you can do for your network/data safety?
Chapter 19 Page 944
Adding cables to lock laptops so they can’t be taken easily. For desktops adding a padlock to the back cover can prevent someone from easily swiping your hard drive. You should also physically secure your network devices in locked cabinets.
Port Forwarding
Chapter 19 Page 944
Port forwarding dictates what traffic is allowed to flow through. The router can be configured to enable individual port traffic in, or out, or both. Port forwarding is also known as port mapping.