Security Flashcards
Which of the following is a series of two doors with a small room between them?
Mantrap
Trapdoor
Badgetrap
Mantrap
A mantrap is a series of two doors with a small room between them. The user is authenticated at the first door and then allowed into the room. At that point, additional verification will occur (such as a guard visually identifying the person), and then the person is allowed through the second door. A trapdoor is a doorway that is usually hidden. A saferoom is a room that is impenetrable from outside, and badgetrap is not a term used when disusing doorway systems
Which of the following physical characteristics is used to identify the user?
Hardware tokens
Biometric locks
Smart cards
Biometric locks
Biometric devices use physical characteristics to identify the user. Such devices are becoming more common in the business environment. Biometric systems include hand scanners, retinal scanners, and, possibly soon, DNA scanners. Hardware tokens are devices that contain security credentials. Smart cards are cards that contain a chip and credentials. Badge readers are devices that read the information on a card and allow or disallow entry
In which filtering is the physical address used?
MAC address filtering
Email filtering
IP address filtering
MAC address filtering
As physical addresses are MAC addresses, MAC address filtering is the correct answer. Email filtering is the filtering of email addresses from which one is allowed to receive. IP address filtering is the type of filtering done on a router or firewall, based on IP addresses. URL filtering restricts the URLs that can be reached with the browser
What firewall only passes or blocks traffic to specific addresses based on the type of application?
Packet filter firewalls
Proxy firewalls
Stateful inspection firewalls
Packet filter firewalls
A firewall operating as a packet filter passes or blocks traffic to specific addresses based on the type of application. The packet filter doesn’t analyze the data of a packet; it decides whether to pass it based on the packet’s addressing information. A proxy firewall is one that makes the Internet connection on behalf of the user and can control where the user goes. Stateful firewalls monitor the state of every TCP connection, thus preventing network mapping. A new-generation firewall is one that operates on all levels of the OSI model
Which of the following was created as a first stab at security for wireless devices?
WPA
TKIP
WEP
WEP
Wired Equivalent Privacy (WEP) is a standard that was created as a first stab at security for wireless devices. Using WEP-encrypted data to provide data security has always been under scrutiny for not being as secure as initially intended. Wi-Fi Protected Access (WPA) and WPA2 are later methods that cane after WEP. Temporal Key Integrity Protocol is the encryption method used in WPA
Which of the following was used to increase security in WPA?
TKIP
AES
IPSec
TKIP
WPA was able to increase security by using a Temporal Key Integrity Protocol (TKIP) to scramble encryption keys using a hashing algorithm. Temporal Key Integrity Protocol is the encryption method used in WPA. Advanced Encryption Standard (AES) is the encryption used in WPA2. IPSec is an industry-standard encryption method, and Secure Sockets Layer (SSL) is an encryption method used in many VPNs
Which type of virus covers itself with protective code that stops debuggers or disassemblers from examining critical elements of the virus?
Companion
Macro
Armored
Armored
An armored virus is designed to make itself difficult to detect or analyze. Armored viruses cover themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus. A companion virus is one that attaches to a file or adopts the name of a file. A macro virus is one that hides in macros, and a multipartite virus is one that has multiple propagation methods
What element of a virus uniquely identifies it?
ID
Signature
Badge
Signature
A signature is an algorithm or other element of a virus that uniquely identifies it. Because some viruses have the ability to alter their signature, it is crucial that you keep signature files current, whether you choose to manually download them or configure the antivirus engine to do so automatically. An ID is any types of identifying badge or marker. A badge is something worn to provide identification. Marking is not a word typically used when discussing algorithms or attacks
Which of the following is the term used for someone being so close to you when you enter a building that they are able to come in right behind you without needing to use a key, a card, or any other security device?
Spoofing
Tailgating
Keyriding
Tailgating
Tailgating is the term used for someone being so close to you when you enter a building that they are able to come in right behind you without needing to use a key, a card, or any other security device. Many social-engineering intruders needing physical access to a site will use this method of gaining entry. Shadowing is when one user monitors another for training. Spoofing is the adoption of another’s email address, IP address, or MAC address. Keyriding is not a word typically used when discussing social engineering
Which of the following is the process of masquerading as another user or device?
Shadowing
Spoofing
Duplicating
Spoofing
Spoofing is the process of masquerading as another user or device. It is usually done for the purpose of accessing a resource to which the hacker should not have access or to get through a security device such as a firewall that may be filtering traffic based on source IP address. Shadowing is when one user monitors another for training. Duplication is the creation of a matching object. Masking is not a term used when discussing impersonation
Which Windows group allows members to install most software but keeps them from changing key operating system files?
Power user
Guest
Administrator
Power user
The Power Users group is not as powerful as the Administrators group. Membership in this group gives read/write permission to the system, allowing members to install most software but keeping them from changing key operating system files. This is a good group for those who need to test software (such as programmers) and junior administrators. The Guest group is used to allow restricted access to the device. The Administrators group allows full access to the device. The rights held by the Users group are a compromise between Admin and Guest
Which NTFS permission is the least required to run a program?
Full Control
Read
Write
Write
This combines the permissions of Read with those of List Folder Contents and adds the ability to run executables. List Folder Contents allows viewing what items are in a folder. Full Control allows everything, and Read only allows reading documents
Which of the following passwords is the strongest?
pAssword
Pa$$word
P@ssw0rd
P@ssw0rd
Although length is now considered the most important password security factor, complexity is also a factor, and these examples are all the same length. The password P@ssw0rd contains four character types, the most of any of the options, which increases the strength of the password. Password and pAssword contains only two types of characters. Pa$$word contains three types
What principle should drive the granting of permissions?
Separation of duties
Least privilege
Job rotation
Least privilege
When assigning user permissions, follow the principle of least privilege by giving users only the bare minimum they need to do their job. Separation of duties prescribes that any operation prone to fraud should be broken up into two operations with different users performing each. Job rotation has the same goal but accomplishes it by requiring users to move around from job to job. Open rights is not a term used when discussing permission and rights
Which type of screen lock uses gestures?
Fingerprint
Face
Swipe
Swipe
Swipe locks use a gesture or series of gestures, sometimes involving the movement of an icon to open the screen. In some cases, they require only knowledge of the mobile platform in use; they offer no security to the process because no authentication of the user is occurring. Fingerprint locks open when the correct fingerprint is presented. Facial locks require a matching face scan to open. Passcode locks require the configured passcode to unlock