Section 21 Book Ch 27 Securing Computers Flashcards

1
Q

Man-in-the-middle attack

A

When a hacker is interceptting traffic between computer, servers etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Spoofing?

A

To impersonate another entity via email, accounts, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you fight against spoofing?

A

By providing certificates that prove you are who you are and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is (DOS) Denial of service?

A

When you flood a server with requests to the point that the server cant keep up and just gives out 404 codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is (DDOS) Distributed denial of Service?

A

When a massive group of computers controlled by a server somewhere and are commanded to send requests to server to have it shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Zero Day

A

A new kind of attack that have never been seen before

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

symptoms of a hacker in your computer

A

Renamed system files , Disappearing files , Lack of access,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name types of Perimeter security

A

Security guards, Mantrap, Locking doors,

entry control roster, badge reader, smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a hash?

A

A 1 way value , fixed length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are passwords saved and then retrieved

A

They are saved by hash values which are retrieved when you enter a password and then compared to the hash of what you have entered as the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is brute forcing?

A

trying to figure out a passwrod by guessing with multiple types of passwords until success

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a dictionary attack?

A

A list of known types of passwords used to crack password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Rainbow tables?

A

Like a dictionary attack but with tables of words, numbers, and symbols that come together to figure password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name password best practices?

A
Set strong passwords 
Long passwords - phrases 
Password expiration
Screen saver 
Lockscreen password 
Bios passwords
Multi-factor authentification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a worm?

A

First gen of malware that used networks to replicate themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a trojan?

A

Any malware that misleads users of its true intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Rootkit?

A

A type of program that seats itself inside the boot program drives and hides itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Ransomware?

A

A type of malware that threatens to publish data, lock out users unless money is given in exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Ransomware?

A

A type of malware that threatens to publish data, lock out users unless money is given in exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a botnet?

A

A bunch of zomie computers under the control of another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a botnet?

A

A bunch of zomie computers under the control of another

20
Q

What is a keylogger?

A

Records keystrokes

21
Q

What is spyware?

A

A piece of malware that spies on you

22
Q

What are signs of malware?

A
pop-ups
Browser redirection
Security alerts 
App crashes 
OS update failure 
Spam 
Hi-jacked email 
Automated replies 
Invalid certs(Trusted ROOT CA)
22
Q

What are signs of malware?

A
pop-ups
Browser redirection
Security alerts 
App crashes 
OS update failure 
Spam 
Hi-jacked email 
Automated replies 
Invalid certs(Trusted ROOT CA)
23
Q

There is no such thing as anit-virus just anti-malware

A

True

24
Q

What is a recovery console?

A

Anit-malware tools

25
Q

When you have malware on your computer what should you do?

A

Boot from a backup that is a known good

26
Q

To protect against malware what should you do with the dns?

A

Secure your dns

27
Q

What can you do with DNS to protect against malware

A

Encrypt your DNS

28
Q

What is the first step in fighting malware?

A

Identify and research malware symptoms

29
Q

What is the second step in fighting malware?

A

Quarantine the infected systems

30
Q

What is the third step in fighting malware?

A

Disable system restore - Windows

31
Q

What is the fourth step in fighting malware?

A

Remediate the infected systems

update the anti-malware files

32
Q

What is the fifth step in fighting malware?

A

Scan and remove techniques with anti-malware

33
Q

What is the sixth step in fighting malware?

A

Schedule Scans

34
Q

What is the Sixth part 2 step in fighting malware?

A

Enable system restore and make a system restore point and delete old system retore

35
Q

What is the seventh step in fighting malware?

A

Educate your users about mal-ware

36
Q

What is Phishing?

A

Fake emails trying to gain info from you

37
Q

What is spear phishing?

A

Emails tailored to a certain individual for hacking

38
Q

First step of incident response

A

Know your responsibility

39
Q

Second step of incident response

A

Identify the problem

  • Report through proper channels -Data/Device preservation
  • Use of documentation
  • Document changes
40
Q

third step of incident response

A

Keep chain of custody

  • Tracking evidence
  • Document process
41
Q

What is a End-User Licensing agreement (EULA)

A

Grants a person a license to use something
Who the owner is
How you can use the software

42
Q

What is Digital Rights Management (DRM)?

A

Protects the different types of digital copyrights

43
Q

What is the GNU General Personal License (GNU GPL)

A

Specifies that if you compile something you have to show the original code

44
Q

What is a personal license?

A

Licenses for something that are given out on a per person basis

45
Q

What is a enterprise license?

A

A software site license that is issued to a large company. It typically allows unlimited use of the program throughout the organization

46
Q

What is Materials safety data sheet (MSDS)

A

How to handle enviornmetal products for disposal and stuff

47
Q

For computers what are the best temp and humidity levels

A

Cold and dry

48
Q

If vacuuming a computer what should you use?

A

Anti static vacuum