Securing Individual Systems Part 2 Flashcards

1
Q

This is also known as media sanitation…

A

Data Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are monitors vulnerable?

A

They have USB slots that could be used to get into system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RATs

-Trojan that doesn’t do anything bad until someone tells it to remotely

A

Remote Access Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus that’s designed to make itself hard to find

A

Armored Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type of secure operating system?

  • Windows Server
  • built in funtionality
  • more connections
A

Server OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WPS

A

Press a button on your printer and then on your computer and you’re connected via WPA-2 encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of secure operating system?

-Desktop versions

A

Workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SED

-TPM built into drive

A

Self Encrypting Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EMI

A

Electromagnetic Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False

-Host-based firewalls are set up as implicit deny by default

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Rubber Ducky?

A

USB stick that you’re computer sees as a keyboard, but is actually a hacking tool that can run scripts and such

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Developer could write this into software for good or bad reasons

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Clearing

A

Can be done with commands such as erase, format, and delete - these methods are not final

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Type of secure operating system?

  • Apple
  • Android
A

Mobile OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDS

-Can help detect threats to the host

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Type of secure operating system?

  • limited functions
  • usually linux based
A

Kiosk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Programs that try to put ads up

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Clustering

A

More than one computer doing the same job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Bluetooth has how many classes?

A

Class 1 - 328’
Class 2 - 33’ distance (most popular for phone/headphones)
Class 3 - 3’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Used in smart phones and cars to ensure security on these embedded systems…

A

Secure Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Where can you disable ports?

A

In the bios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

FDE

A

Full Disk Encryption

24
Q

What does an ISCSI Initiator do?

A

Finds the SAN drives

25
Q

HSM

-Handles all digital signatures - web servers are an example of who would use this

A

Hardware Security Module

26
Q

Blue-Snarfing

A

Connecting to someones bluetooth without permission to steal data

27
Q

IDS

  • Inside the network
  • Watches within the network traffic
  • Sends alerts on suspicious activity
A

Intrusion Detection Software

28
Q

Purging

A

Will process the device to remove data from the drive - the device will no longer be usable
Ex: magnet machine

29
Q

DEP

-Keeps people from running code through system memory reserved locations

A

Data Execution Prevention

30
Q

Piece of software that attaches to other files, propagates, and spreads to other devices, and then eventually activates

A

Virus

31
Q

Software you don’t want on your computer - it may or may not be bad

A

Malware

32
Q

Malware that changes itself enough to confuse virus detection

A

Polymorphic Malware

33
Q

Similar to RATs - are triggered by an event and not someone remotely

A

Logic Bomb

34
Q

Some form of malware that sends your info back to the creator of it

A

Spyware

35
Q

Blue-Jacking

A

Linking up to someones bluetooth without permission just to use resource

36
Q

This is a built-in Windows tool to write and custom build scripts to automate tasks

A

PowerShell

37
Q

Type of secure operating system?

-certified machines that are locked down as much as possible while keeping functionality

A

Trusted OS

38
Q

What are removable media controls?

A

Not allowing people to use optical drives - can shut it off or put a policy on it

39
Q

ACL that allows programs

A

White List

40
Q

Software that’s running on your system - could be software you’re using but is also doing something bad in the background

A

Trojan

41
Q

Scan results identify a file that may not actually harm a system or is actually allowed on the system

A

False Positive

42
Q

Records keystrokes

A

Keylogger

43
Q

Destroying

A

Will ruin the data and physical media - this includes paper, tape, electronic data, etc.
Ex: Burning, shredding, pulping

44
Q

ACL that denies programs

A

Black List

45
Q

Type of secure operating system?

-appliance

A

Embedded System

46
Q

Software that escalates privileges to execute other things on computer - could be good or bad

A

Rootkit

47
Q

Application management / Desktop Management tools

A

Used to make sure everyone is running the correct version of things and all licenses are accounted for

48
Q

IPS

  • Active IDS
  • Usually close to the edge of the network
  • Action to prevent will occur at the IPS device
A

Intrusion Prevention System

49
Q

Hidden Wifi

A

Ex: they make sd cards wifi cards - you cna plug them into someones printer/security camera and now you’ve created a wifi hotspot on their network

50
Q

SAN

  • Creates new local drives - not network drives
  • ISCSI is another name for this
A

Storage Area Networking

51
Q

TPM

-Chip that holds encryption keys for that drive - usually activated at bios to be able to encrypt drive

A

Trusted Platform Module

52
Q

NAS

  • File based sharing protocol
  • Runs over standard network
    ex: SMB share
A

Network Attached Storage

53
Q

SFC

  • Is a file integrity tool
  • Checks windows core files
A

System File Checker

54
Q

RFI

A

Radio Frequency Interference

55
Q

What does a file integrity check do?

A

Verifies the file isn’t corrupted and that the version and date match expectation

56
Q

ESD

A

Electrostatic Discharge

57
Q

Type of malware that locks up your system until you pay someone money

A

Ransomware/crypto-malware