Lesson 11 Flashcards
The operating system’s role in the protection of the system from physical threats involves:
providing tools to enable system backups and restoration of the OS itself, files, programs and data
The two types of OS backups are:
File backups and system image backups
Computer security is:
the maintenance of system integrity, availability and confidentiality at all times
The operating system uses _____ to ensure users have authorized access to the computer system.
The OS uses authentication to ensure that a user accessing a program is authorized or legitimate.
A program which stands as a barrier between a computer system and external traffic is known as _____.
a firewall
Which software is used to process instructions and coordinate between devices?
Operating system
Which system resource is most likely to use IRQ?
The hardware will get the CPU’s attention using IRQ. (‘hey, there’s something new here’)
answer: hardware
Which of the following would be the most appropriate description of how DMA is used?
DMA channels allow connection between hardware device and memory
Which of the following is software that enables you to perform a specific function?
An application
You have inserted the USB cable for an external hard drive. Which of the following most describes the process or tool that allows the device to be recognized and usable by the operating system?
PnP
PnP, or plug-and-play, ensures that devices can be plugged in and used/identified by the OS. Behind the scenes, the OS communicates with the hardware, using software to identify the device.
An OS security policy is one that outlines the processes of ensuring that the system maintains a certain level of _____, _____ and _____.
integrity, confidentiality, availability
When implementing OS security policies and procedures, how often should organizations review them?
Organizations should review their OS security policies and procedures quarterly or annually. When there are any minor or major changes in the organization’s assets, infrastructure or networks, all policies and procedures should be updated.
Which policy includes both the incident response policy and the disaster recovery plan?
Business Continuity Plan
Which policy informs users on how to handle an organization’s confidential or sensitive information?
The main objective of the information security policy is to inform users that there are guidelines that they will be held accountable for while handling sensitive data for the organization. These policies can be broken down into areas such as how employees uses IT assets, how they use the network, and rules about internet usage.
Which statement below is not a subject that would be included in an Access Control Policy (ACP)?
Installing a firewall
If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement?
Data loss prevention (DLP) uses pattern recognition to prevent sensitive data from leaving the corporate network.
If you are using administrative policies to enhance your network security, which of the following would you NOT be doing?
Scanning emails for viruses
Which of the following are NOT a method to deliver network security?
Over the telephone
When can a network security hardware appliance stop threats on the network?
When it is installed in line.
A multi-layered approach to network security is best because _____.
Different types of network security systems focus on different threats and vulnerabilities
Live threat-intelligence helps the firewall to identify and stop _____.
Threats that the firewall may have never seen before.
A firewall can be used to direct and control traffic _____.
both coming in and going out of your network
What type of firewall can stop more advanced threats, such as tricks devised by hackers to bypass the firewall’s access policy protection?
The next-generation firewall is the latest type of firewall (as of 2016) that can stop the most advanced and evasive threats.
What is the maximum number of zones that can be associated to a firewall?
Firewalls can potentially have many of zones associated with them. Simple networks usually have between two and four zones. More complex networks can have hundreds of zones. The more zones that are managed by the firewall, the more complex and enterprise-grade your firewall is likely to be.
Which of the following is the purpose of a firewall access policy?
It provides a set of rules that determine who gets in or out of your network and who doesn’t.
What is a VPN?
A network that is only accessible with the correct credentials
What is required for a VPN to function correctly?
Encryption and authentication protocols
What are two types of VPNs?
Site-to-site and remote access
What are some of the tunneling protocols that VPNs use?
IPsec and L2TP
What service does a VPN solution provide?
Remote access to private network resources
A network security policy:
All of these answers are correct
A network security policy defines what needs protecting, includes rules for end users, and management’s objectives for security.
A/An _____ specifies proper utilization of company computer resources and how to protect private information.
An acceptable usage policy (AUP) covers proper utilization of company computer resources and how to protect private information.
Two of the first steps in developing a network security policy are:
Deciding what assets need protecting and assessing potential vulnerabilities
An example of an internal network security threat is:
All of these answers are correct
Internal security threats can include accidental damage, employee theft, and employee misuse.
The network security policy is a living document because:
Assets and threats change over time
Which of these is an example of the Internet of Things?
A vehicle that can receive updates wirelessly.
What is the purpose of the Internet of Things?
To create connections between devices, human and data.
What is the Internet of Things?
The connection of everyday devices to the Internet.
The Internet of Things is the connection of everyday devices, like light bulbs and thermostats, to the Internet.
This component of the Internet of Things concerns the networking and technology that keeps the Internet of Things functioning.
The infrastructure of the Internet of Things is important for developing ties between devices, humans and data, and making sure the Internet of Things operates effectively.
Amazon Go’s grocery store experience without checkout lines is an example of what component of the Internet of Things?
Processes
How has the Internet of Things prompted new concerns over security issues?
Devices are not compatible with traditional security measures.
The increase in IoT devices has prompted new concerns over security issues since older methods of security protocols are typically not compatible with new gadgets.
IoT devices create more significant security challenges for networks due to all of these concerns EXCEPT which?
They produce an event log.
IoT devices create significant security challenges for networks because they are always on and connected and do not typically issue security alerts if a breach or hack has occurred.
Ralph went to the home improvement store and purchased a new smart lock for his home. Which of these common challenges with IoT devices today may Ralph face with his new device?
Mass production concerns.
The mass production of IoT devices, like smart locks, makes it possible for hackers to breach all devices once they’ve breached a single device.
A common security concern among organization-owned IoT devices is _____.
Employees accessing them outside network security.
The protection potentially offered in an organization’s network goes away when an employee utilizes an IoT device either in a public setting or at their home, causing the potential for network intrusions.
Commonly performed on traditional devices such as computers, _____ are frequently not capable on IoT devices due to memory or unique operating systems.
Security Updates.
Updates, while common on more traditional internet-enabled devices such as computers, are frequently not an option on IoT devices due to memory issues or unique operating systems that won’t support them.
A/An _____ specifies proper utilization of company computer resources and how to protect private information.
Acceptable Usage policy
Besides a direct attack on a network by a hacker, which security threat below is the next most worrisome
Virus
A virus is the most worrisome because the code is downloaded onto your computer and eventually to your network without your knowledge. Once a virus is installed and activated it replicates itself very quickly and saturates the network. Viruses can be destructive and render a computer or network useless until it is removed.
According to network security engineers and other experts in the security field, the likelihood of eliminating all security threats is _____.
Not likely
Areas of weakness
Network security threats: types and vulnerabilities
what is a network security policy: procedures and examples