Security Flashcards

1
Q

What are two ways people can gain unauthorized access to something?

A

Dumpster diving / Shoulder surfing for passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a method used to prevent infiltration?

A

A man trap, where two doors and authentication is used to capture and deny people who don’t belong in the building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is DoS

A

Overwhelm servers, deny access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three examples of hardware authentication

A

Smartcard readers, RSA token (keyfob with code), Badges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principal of least privilege?

A

Assigning the bare minimum permissions a person needs to do their job in the name of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a security policy?

A

Permissions an admin can set to ensure security. Things such as password max ages, desktop backgrounds, scripts to run at startup are included.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is PII

A

Personally Identifiable information - Info that can lead back to a specific individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is PHI

A

Protected health information - Including medical diagnoses and healthcare received by any institution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When it comes to compliance policies, what is PCI?

A

Payment card industry. Practices all people who handle transfers, accept money or deal with credit card funds must follow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Open Source?

A

Open source allows modification and redistribution of code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three traits of a Virus

A

Replicates and Activates
Only replicates to other drives, not across networks
Requires human interaction to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two traits of a worm

A

Propagates across a network

Doesn’t hitchhike on programs like a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are three traits of a Trojan horse

A

Pretends to be something it’s not
Does not replicate
Activates upon execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Rootkit

A

Something that hides in low level OS functions such as firmware. These can hold elevated privileges…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Zero Day exploit

A

A vulnerability previously unknown to the devs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is session hijacking?

A

Sniffing packets to steal authentication data, and then inserting yourself into the session while pretending to be the original recipient.

17
Q

What is a dictionary attack

A

Using known words or passwords from breaches to attempt to log in to an account

18
Q

What is a rainbow table attack

A

Attempting to crack the hashes of databases using a rainbow table

19
Q

What are three symptoms of malware on your system

A

High frequency crashes and slows even with your apps closed
High usage in task manager
Being redirected in your browser

20
Q

What is a polymorph virus

A

A virus that changes its signature to hide against anti virus malware

21
Q

What are four steps to take when you have an infected machine

A

Quarantine the machine
Boot to safe mode or a bootable AV media
If you didn’t solve the virus, restore
Remediate (Fix what it broke)

22
Q

What is the purpose of a firewall

A

To hide IPs, ports and analyze packets coming into the network.

23
Q

What is stateful packet inspection?

A

Where a firewall individually inspects every packet entering the network for sus activity.

24
Q

What does port forwarding do?

A

Directs any data that comes in on a specific port to a specific PC on the network

25
What is port triggering
Opening a specified incoming port when you send data on a specific outgoing port. Ex: Sending out data on 1333 opens port 3389.
26
What is a DMZ
Being outside of the firewall and vulnerable to any incoming connections.
27
What is an IDS
Intrusion detection system sits within the network and notifies administrators of any activity. It acts as a second firewall of sorts. Inspects packets.
28
What is an IPS
A system that sits directly in the flow of traffic. It can prevent active attacks against your network that a firewall may have missed but if the IPS goes down so does your network. It also adds considerable overhead to your network.
29
What is UTM
(UTM) refers to when multiple security features or services are combined into a single device within your network.
30
What is IPsec
Ip Security is used to provide encryption between servers and clients. Can be used in VPNs.
31
What is Secure Sockets Layer and Transport Layer Security.
Encryption methods that provide encryption to web browsers when connecting to servers.