Security Flashcards
You are responsible for securing a large server room. You want to prevent unauthorized personnel from gaining entrance by simply following an authorized user into the room (a security breach referred to as tailgating). Which common prevention method would you incorporate to best secure the area?
a mantrap
Explanation:
A mantrap (access control vestibule) would prevent unauthorized users from following someone into a secure area. There are a number of different configurations of a mantrap. One is a small room with two doors that have to be accessed independently to gain access to the secure area. There could also be something as simple as a turnstile in place.
What type of threat occurs within an organization?
insider threat
Explanation:
An insider threat is one that occurs within the organization and can be the most harmful, due to the potential scope of access by the threat actor, as well as the hardest to detect, for the same reason.
What is a commonly used method to prevent the theft of laptops?
a cable lock
Explanation:
On nearly all laptops, there is a reinforced clip that allows a cable to be securely attached. Keep in mind that this is a less than perfect solution, since someone with a bolt cutter can defeat a cable lock.
You work in an environment where your laptop is clearly visible to people nearby. You want to prevent other individuals from viewing your screen. What could you do to help prevent this from happening?
Use a privacy screen.
Explanation:
Privacy screens prevent viewing a screen from any angle except directly in front of the screen. Anyone viewing at an angle would see the screen as black.
What is a security device that users carry with them, usually in the form of a key fob?
token
Explanation:
Security tokens are devices carried by individuals that contain various types of authorization information such as passwords, digital certificates, and randomly generated numbers that are used to verify user authenticity.
This type of list permits or denies a user’s access inside a network, such as being able to access a server or specific files.
access control list
Explanation:
Access Control List (ACL) is the mechanism used to set various permissions to allow or deny access rights. Depending on the device, there can be various security attributes to identify rights and privileges.
This Windows® feature allows users to encrypt an entire volume, making it secure even if the drive is stolen.
BitLocker®
Explanation:
BitLocker encrypts an entire volume, making it completely inaccessible without authentication credentials. If the drive is stolen, the data would remain encrypted.
What type of attack attempts to embed malicious script within a legitimate website?
XSS
Explanation:
A cross-site scripting (XSS) attack is commonly used on legitimate websites to embed malicious scripts intended to coax the user into installing malware on their device.
This security threat occurs when someone on your network can monitor a conversation in both directions and can secretively modify the contents of the communications.
an on-path attack
Explanation:
When someone on a network can capture and modify communication sessions in both directions, it is referred to as an “on-path attack.” This was formerly known as a “man-in-the-middle attack.” The easiest way to prevent this type of attack is to encrypt the data being sent.
When a vulnerability exists in software that is, as yet, unknown to the vendor, but known to a hacker, this is referred to as a ____.
zero-day attack
Explanation:
Software vendors attempt to release patches as soon as they are discovered to prevent security breaches. Occasionally, hackers will discover these vulnerabilities before the vendor is aware and will attempt to exploit it before a patch is created.
Changing a MAC address to match another host address in order to appear to be a trusted host on a network is referred to as ____.
spoofing
Explanation:
MAC addresses are burned into ROM chips on network interface cards. Each MAC address is unique, using a 48-bit number. There are over 280,000,000,000,000 available, worldwide. A user can modify his MAC address to appear to be a trusted host on a network to acquire access to the network. This is referred to as MAC spoofing.
This is a form of malicious software that appears to become part of the operating system by modifying the core system files to hide itself.
rootkit
Explanation:
A rootkit attempts to modify the core system files to look like it is part of the actual operating system. If successful, anti-virus software may not detect the presence of a rootkit. It can then allow unauthorized access to the system. Special anti-rootkit software is available to remove rootkits.
If a user is transmitting sensitive data that should be encrypted, but is being sent in the clear (unencrypted), what method could be implemented systemwide to detect this?
Data Loss Prevention (DLP)
Explanation:
DLP can be implemented in various ways: specific software on a server, a piece of network hardware, or a firewall that detects when data is being sent unencrypted. This can then be used to notify the administrator of the security breach.
A feature of NTFS that allows users to encrypt individual files, rather than an entire volume, is referred to as ____.
Encrypted File System (EFS)
Explanation:
EFS encrypts files based on users’ log name and password, unlike BitLocker®, which encrypts the entire volume.
The procedure that requires users to change a password periodically is referred to as ____.
password expiration
Explanation:
System administrators can force users to change passwords by setting passwords to expire on a certain date. Most administrators consider every 30 days as ideal for a password expiration period.