Security Flashcards

1
Q

What are two ways people can gain unauthorized access to something?

A

Dumpster diving / Shoulder surfing for passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a method used to prevent infiltration?

A

A man trap, where two doors and authentication is used to capture and deny people who don’t belong in the building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is DoS

A

Overwhelm servers, deny access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three examples of hardware authentication

A

Smartcard readers, RSA token (keyfob with code), Badges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principal of least privilege?

A

Assigning the bare minimum permissions a person needs to do their job in the name of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a security policy?

A

Permissions an admin can set to ensure security. Things such as password max ages, desktop backgrounds, scripts to run at startup are included.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is PII

A

Personally Identifiable information - Info that can lead back to a specific individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is PHI

A

Protected health information - Including medical diagnoses and healthcare received by any institution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When it comes to compliance policies, what is PCI?

A

Payment card industry. Practices all people who handle transfers, accept money or deal with credit card funds must follow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Open Source?

A

Open source allows modification and redistribution of code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three traits of a Virus

A

Replicates and Activates
Only replicates to other drives, not across networks
Requires human interaction to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two traits of a worm

A

Propagates across a network

Doesn’t hitchhike on programs like a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are three traits of a Trojan horse

A

Pretends to be something it’s not
Does not replicate
Activates upon execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Rootkit

A

Something that hides in low level OS functions such as firmware. These can hold elevated privileges…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Zero Day exploit

A

A vulnerability previously unknown to the devs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is session hijacking?

A

Sniffing packets to steal authentication data, and then inserting yourself into the session while pretending to be the original recipient.

17
Q

What is a dictionary attack

A

Using known words or passwords from breaches to attempt to log in to an account

18
Q

What is a rainbow table attack

A

Attempting to crack the hashes of databases using a rainbow table

19
Q

What are three symptoms of malware on your system

A

High frequency crashes and slows even with your apps closed
High usage in task manager
Being redirected in your browser

20
Q

What is a polymorph virus

A

A virus that changes its signature to hide against anti virus malware

21
Q

What are four steps to take when you have an infected machine

A

Quarantine the machine
Boot to safe mode or a bootable AV media
If you didn’t solve the virus, restore
Remediate (Fix what it broke)

22
Q

What is the purpose of a firewall

A

To hide IPs, ports and analyze packets coming into the network.

23
Q

What is stateful packet inspection?

A

Where a firewall individually inspects every packet entering the network for sus activity.

24
Q

What does port forwarding do?

A

Directs any data that comes in on a specific port to a specific PC on the network

25
Q

What is port triggering

A

Opening a specified incoming port when you send data on a specific outgoing port.
Ex: Sending out data on 1333 opens port 3389.

26
Q

What is a DMZ

A

Being outside of the firewall and vulnerable to any incoming connections.

27
Q

What is an IDS

A

Intrusion detection system sits within the network and notifies administrators of any activity. It acts as a second firewall of sorts. Inspects packets.

28
Q

What is an IPS

A

A system that sits directly in the flow of traffic. It can prevent active attacks against your network that a firewall may have missed but if the IPS goes down so does your network. It also adds considerable overhead to your network.

29
Q

What is UTM

A

(UTM) refers to when multiple security features or services are combined into a single device within your network.

30
Q

What is IPsec

A

Ip Security is used to provide encryption between servers and clients. Can be used in VPNs.

31
Q

What is Secure Sockets Layer and Transport Layer Security.

A

Encryption methods that provide encryption to web browsers when connecting to servers.