Security (4) Flashcards

1
Q

Which type of malware is designed to replicate itself and spread, without the need for inadvertent user action to help it do this?

Virus

Worm

Trojan

A

Worm

A worm is different from a virus in that it can reproduce itself, it’s self-contained, and it doesn’t need a host application to be transported. Many of the so-called viruses that have made the news were actually worms. Worms can use TCP/IP, email, Internet services, or any number of possibilities to reach their target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your network has recently been hit with a significant amount of spam messages. What should you implement to help reduce this nuisance?

Firewall

Email filtering

Access control list

A

Email filtering

Email filtering, as the name implies, involves filtering email before passing it on. This can be done with messages intended both to enter and to leave the network, and it can head off problems before they can propagate. One of the simplest filters is the spam filter included with most email programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You want to grant LaCrea the ability to change permissions for others on the Equity folder, which is on an NTFS volume. Which level of NTFS permission do you need to grant her?

Read & Execute

Change Permissions

Full Control

A

Full Control

The Full Control permission gives the user all the other permissions and the ability to change permissions for others. The user can also take ownership of the directory or any of its contents. There is no Change Permissions standard NTFS permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You read an article on the Internet about a hacker who bragged about creating a program that can try to log in by guessing one million passwords per second. What type of attack is he attempting?

Zombie/botnet

Phishing

Brute forcing

A

Brute forcing

A brute-force attack is an attempt to guess passwords until a successful guess occurs. Because of the nature of this attack, it usually occurs over a long period of time, but automated programs can do it quickly. In this situation, you might have been tempted to choose a dictionary attack, but the defining characteristic of those attacks is the use of common words, which was not part of this question. (Brute force can be combined with dictionary attacks as well.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following security methods will prove to be ineffectual when trying to prevent software-based attacks? (Choose two.)

Mantrap

Firewall

Anti-malware

Privacy filter

A

Mantrap

Privacy filter

A mantrap and privacy filters are physical security methods. They will not prevent software-based attacks. Firewalls can block malicious network traffic, and anti-malware can block malicious software such as viruses and worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have been instructed to destroy several old hard drives that contained confidential information, so you take them to a local company that specializes in this process. The IT director wants confirmation that the drives were properly destroyed. What do you need to provide him with?

Photos of the destroyed hard drives

A notarized letter from the disposal company

A certificate of destruction

A

A certificate of destruction

A certificate of destruction (or certificate of recycling) may be required for audit purposes. Such a certificate, usually issued by the organization carrying out the destruction, is intended to verify that the asset was properly destroyed and usually includes serial numbers, type of destruction done, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have a corporate iPhone. Today, you notice that there is a new iOS update available for your device. For the best security, which of the following is recommended?

Wait until corporate IT approves the change before updating your OS.

Update your OS immediately.

Wait one week to ensure that the OS update has no issues and then update your device.

A

Update your OS immediately.

The best rule of thumb is that if your OS vendor provides an update, you should install it as soon as possible. Some companies do want their corporate IT groups to vet the update first, but it’s still always a best practice to update sooner rather than later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Larissa is trying to access the Flatfiles folder on a remote NTFS volume. She is a member of the Datateam group. The Datateam group has NTFS permissions of Allow Read & Execute. The folder is shared with the Datateam group, but there are no explicit Allow or Deny permissions checked. What is Larissa’s access level to the Flatfiles folder?

Full Control

Read & Execute

Read

A

Read & Execute

Share and NTFS permissions are both consulted when accessing an NTFS resource across the network. The most restrictive permission set between the two is applied. If there are no explicit Allow or Deny share permissions set, though, then only the NTFS permissions apply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sue is an administrator on the network and is logged in with an account in the Users group but not the Administrators group. She needs to run SFC on the computer, which requires administrative privileges. What is the easiest way for her to do this?

Log off and back on again with an account that is part of the Administrators group. Then open a command prompt and run SFC.

Open a command prompt by choosing Run As Administrator and then run SFC.

Right-click the SFC icon in Control Panel and choose Run As Administrator.

A

Open a command prompt by choosing Run As Administrator and then run SFC.

If you attempt to run some utilities (such as SFC) from a standard command prompt, you will be told that you must be an administrator running a console session in order to continue. Rather than opening a standard command prompt, choose Start ➢ All Programs ➢ Accessories and then right-click Command Prompt and choose Run As Administrator. The UAC will prompt you to continue, and then you can run SFC without a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Priscila is working at a Windows 8.1 workstation, formatted with NTFS. She is a member of the Dev group and the Ops group. The Dev group has Read access to the projects folder, and the Ops group has Write access. What is Priscila’s effective permissions for the projects folder?

Full Control

Read and Write

No access

A

Read and Write

When users are granted NTFS permissions from multiple groups, their effective permissions are cumulative, or the most liberal of the permissions assigned. In this case, Write also gives the ability to Read; therefore, the user has both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of security method allows you to get your security device in close proximity to a reader (but doesn’t require touching) to validate access?

PIN code

Badge reader

Security token

A

Badge reader

A smart card is a type of badge or card that gives you access to resources, including buildings, parking lots, and computers. It contains information about your identity and access privileges. A protected computer or area has a badge reader in which you insert your card. In the case of using Radio Frequency Identification (RFID), the reader is a wireless, no-contact technology and the user does not need to touch the card to the reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Someone has configured an external server with an IP address that should belong to one of your sister company’s servers. With this new computer, they are attempting to establish a connection to your internal network. What type of attack is this?

Spoofing

Man-in-the-middle

Zombie/botnet

A

Spoofing

A spoofing attack is an attempt by someone or something to masquerade as someone else. This type of attack is usually considered an access attack. The most popular spoofing attacks today are IP spoofing, ARP spoofing, and DNS spoofing. This is an example of IP spoofing, where the goal is to make the data look as if it came from a trusted host when it didn’t (thus spoofing the IP address of the sending host)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of security device often incorporates RFID technology to grant access to secure areas or resources?

Smart card

Security token

Mantrap

A

Smart card

A smart card is a type of badge or card that gives you access to resources, including buildings, parking lots, and computers. It contains information about your identity and access privileges. Each area or computer has a card scanner or a reader in which you insert your card. Radio Frequency Identification (RFID) is the wireless, no-contact technology used with these cards and their accompanying reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are configuring a wireless network for a small office. What should you enable for the best encryption possible for network transmissions?

WPA2

WEP

WPA

A

WPA2

There are generally three wireless encryption methods available. From least to most secure, they are WEP, WPA, and WPA2. Always go with WPA2 unless strange circumstances prevent you from doing so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following prevention methods will best deter the usefulness of Dumpster diving for confidential materials?

Document shredding

Privacy filters

Cable locks

A

Document shredding

Companies normally generate a huge amount of paper, most of which eventually winds up in dumpsters or recycle bins. Dumpsters may contain information that is highly sensitive in nature, and attackers may seek it out by practicing dumpster diving. In high-security and government environments, sensitive papers should be either shredded or burned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which types of security threats involve the attacker attempting to directly contact a potential victim? (Choose two.)

Spoofing

Phishing

Social engineering

Brute forcing

A

Phishing

Social engineering

Social engineering is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. When this is done via email or instant messaging, it’s called phishing

17
Q

Jennie uses her security badge to enter the building through a secured door. Tim tries to enter the building behind her before the door closes, without swiping a badge. What type of behavior is Tim demonstrating?

Man-in-the-middle

Brute force

Tailgating

A

Tailgating

Tailgating refers to being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device. Using mantraps, which are devices such as small rooms that limit access to one or a few individuals, is a great way to stop tailgating. Revolving doors can also help prevent tailgating

18
Q

After installing a wireless router, a technician notices that he is able to get a network signal in the parking lot. The manager is afraid of potential attackers performing war driving. What can the technician do to reduce the risk of this?

Disable the SSID broadcast.

Reduce the radio power level.

Assign static IP addresses.

A

Reduce the radio power level.

On the chance that the signal is actually traveling too far, some access points include power level controls that allow you to reduce the amount of output provided

19
Q

You receive an email from one of your friends. In it, she includes a link telling you to click it to see some recent pictures she took of you. It’s been several weeks since you’ve seen this friend, and you are suspicious. What could this be an example of?

Spear phishing

Zombie/botnet

Social engineering

A

Spear phishing

This is an example of spear phishing, which is a specific form of social engineering. With spear phishing, the attacker uses information that the target would be less likely to question because it appears to be coming from a trusted source (when, in reality, the attacker in this case has hacked a friend’s email account). Because it appears far more likely to be a legitimate message, it cuts through your standard defenses like a spear, and the likelihood that you would click this link is higher

20
Q

You receive an email from an overseas bank notifying you that a relative has left you a large sum of money. You need to respond with your bank routing information so they can electronically transfer the funds directly to your account. What is this most likely an example of?

Phishing

Ransomware

Spoofing

A

Phishing

Social engineering is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. A social engineering attack may occur over the phone, by email, or in person. When the attempt is made through email or instant messaging, it is known as phishing, and it’s often made to look as if a message is coming from sites where users are likely to have accounts (banks, eBay, and PayPal are popular)

21
Q

What type of physical security explicitly relies upon a security guard or other personnel to determine who can access the facility?

Entry control roster

Mantrap

ID badges

A

Entry control roster

If you have an open-access building but then need people to access a secured area, one way to provide security is through a guard. An access list or entry control roster should then exist to identify specifically who can enter and can be verified by the guard or someone with authority

22
Q

Which user account on a Microsoft Windows workstation has the least restrictive permissions by default?

Administrator

Guest

Standard User

A

Administrator

The Administrator account is the most powerful of all: It has the power to do everything from the smallest task all the way up to removing the operating system. Because of the power it wields, you should rename the account and assign it a strong password

23
Q

Which type of malware will often cause critical files to disappear, often while displaying a taunting message, and requires user intervention (usually inadvertent) to spread from computer to computer?

Worm

Virus

Trojan

A

Virus

Many viruses will announce that you’re infected as soon as they gain access to your system. They may take control of your system and flash annoying messages on your screen or destroy your hard disk. When this occurs, you’ll know that you’re a victim. Other viruses will cause your system to slow down, cause files to disappear from your computer, or take over your disk space. Many viruses today are spread using email. The infected system attaches a file to any email that you send to another user. The recipient opens this file, thinking it’s something that you legitimately sent them. When they open the file, the virus infects the target system