Part 4 Flashcards
When an antivirus program detects a virus an option may be given to an administrator to remove, clean or ____ a file.
Quarentine
There are occasions when a file or program may exhibit behavior or coding that triggers a signature or behavior alert from an antimalware system often called?
False Positive
An algorithm or hash that is unique to a specific attack method or virus?
Signature
What scans continuously inspect files and email data for viruses as they are read from or written to a computer?
Auto Protect
What does the effectiveness of VSE depend on?
Scanning engine and definition DAT files
What prevents unwanted changes to your computer by retricting access to specified ports, files, shares etc?
Access Protection
How often on COMPOSE do Anti Virus scans run?
Daily
What is real time monitoring for malicious activities?
Behavioral
What is a program that attaches itself to a file or another program?
Virus
What is a program that replicates and propogates itself without having to attach itself to a file or program.
Worm
What are three reasons privilage escalation can occur?
- Error by administrator
- weak password policy
- bad coding in software
What are additional security settings required?
- Account lockout duration
- minimum password length
- disabling unnecessary services
- “Allow administration by” option
What are 4 types of Trojans?
Remote Access Trojan (RAT) : full or partial access to victim’s system
Data Sending : sends key strokes, passwords, cookies via email or back door
Destructive : deleting files, corrupting the OS, crashing the system, disable AV on the firewall
Proxy : jumping point for an attacker on another system to mask identity
What is the purpose of Denial of Service attack?
Deny legitimate users from accessing infomation or resources
What are some signs of Denial of Service attack?
- Spam
- Unavailable website
“Flood”, slowing or stopping data transfer, consumption of disk space or processor time, disrupting routing info, disrupting physical network components
What involves exploiting the session between devices?
Session hijacking
How can you prevent session hijacking?
- Use encryption
- use secure protocol
- limit incoming connections
- minimize remote access
- strong authentication
- using switches over hubs
- user training
How many user accounts should an admin have at minimum?
2
User and administrator
What command line run script launches GPO editor?
gpedit.msc
What provides the configuration setting of RBAC settings for installed applications?
Authorization Manager
What analyizes system configuration and applies security templates?
Security Configuration and Analysis
On a windows system, GPO editor seperates the local computer policy into two sections?
- Computer configuration
- User configuration
What provides the options for setting system auditing, rights assigned to groups, and their users and security features such as device settings, log on requirements, account settings, network access etc?
Local Policies
What provides options for setting password complexity and length requirements as well as account lockout lengths and attempt frequencies?
Account Policies
Database cryptography must be compliant against what for authentication of DBMS?
FIPS 140-2
How can you protect databases from Denial of Service attacks?
- Limit the number of connections
- Database clustering
What should be implemented to limit exposure?
Role Based Access Control Policy
What are password complexity requirements?
- minimum length
- # of upper and lower case letters
- # of numeric characters
- # of special characters
- password history or reuse
How long can an account be inactive before it should be disabled?
35 days
What kind of permissions should a bind account have?
Full administrative access to the database
What type of account is used to connect an application to its database?
Bind account
Where do databases fall under?
Application Core SRG
What are the 4 core SRGs?
- Application
- network infrastructure
- operating system
- policy
What are collections of requirements applicable to a given technology family?
SRG- Security Requirement Guides
What could result in the loss of privacy, corruption of data, breach national security?
Attack on DBMS
What is the default admin account created during a COMPOSE install?
Compinstaller
What determines the service configuration for a computer is controlled by the role the machine will serve on the network?
Core Services Installation stage of install
What are the 4 modules of COMPOSE?
Baseline Configuration Module (BCM)
Domain Configuration Module (DCM)
Core Services Installation Module (CSIM)
Security Configuration Module (SCM)
What sets the policies for the built in IPSec Software?
IP Security Policy on Location Computer
What provides the ability to configure EFS, Bit Locker, and the built in cryptographic capabilities?
Public Key Policies