James Adams Chapter 19 Flashcards

1
Q

Low level format vs. standard format

Chapter 19 Page 936

A

Standard formats uses a systems format utility, which may not remove all of the data on a drive.

Low-level formats are typically accomplished in a factory and is much more reliable in removing all data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Degaussing

Chapter 19 Page 938

A

Degaussing involves applying a strong magnetic field to destroy magnetic data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a certificate of destruction?

Chapter 19 Page 939

A

These may be required for audit purposes. These certificates are usually handed out by the organization carrying out the destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F?

Wireless networks in the 5ghz range are completely secure.

Chapter 19 Page 939

A

False. A wireless network is not and never will be secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If on a wireless network, CompTIA insists on changing static security keys how often?

Chapter 19 Page 939

A

Every 2-4 weeks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F?

Wireless networks with limited security regularly broadcast their SSID.

Chapter 19 Page 940

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are a few types of wireless encryptions?

Chapter 19 Page 940

A

WEP, WPA, WPA2…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does disabling your SSID broadcast do?

Chapter 19 Page 940

A

This will stop the announcing of your network, it won’t show up in the list of available networks to anyone. The network can still be accessed if someone knows the SSID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F?

Most APs offer the ability to turn on MAC filtering.

Chapter 19 Page 940

A

True, but it is off by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is antenna placement important?

Chapter 19 Page 941

A

Antenna placement/range may give others access to your network from further away, even outside of the building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does MAC filtering do?

Chapter 19 Page 942

A

MAC filtering limits access to the network to the MAC addresses that have been allowed to access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can you disable ports to limit the amount of doors for an attacker to come through?

Chapter 19 Page 943

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NTFS tracks security in ACLs, what are ACLs?

Chapter 19 Page 943

A

Access control lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some actions for physical security you can do for your network/data safety?

Chapter 19 Page 944

A

Adding cables to lock laptops so they can’t be taken easily. For desktops adding a padlock to the back cover can prevent someone from easily swiping your hard drive. You should also physically secure your network devices in locked cabinets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port Forwarding

Chapter 19 Page 944

A

Port forwarding dictates what traffic is allowed to flow through. The router can be configured to enable individual port traffic in, or out, or both. Port forwarding is also known as port mapping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly