security Flashcards
the process of verifying the identity of a person or device.
authentication
authentication typically occurs when ?
during logon
this is used to prevent someone from opening the case to your computer
chassis lock
Some motherboards allow you to set a password on the system hard disk, it is called
drive locking
it is used to helps identify when a system case has been opened
chassis intrusion detection
a special chip, on the motherboard, that generates and stores cryptographic keys
Trusted Platform Module (TPM)
TPN chips are configured using what program
BIOS/UEFI
a mechanism used to secure systems that are prone to being stolen, such as notebooks systems.
lo-jack software
how is lo-jack software implemented
within a chip located on the motherboard
UEFI systems requires that firmware updates are digitally signed who
hardware vendor
a UEFI security feature which requires the operating system installed on the system hard drive to be digitally signed
SecureBoot
malware that inserts itself into the boot sector causing it to be loaded first
rootkit
this is used by UEFI to prevent rootkit
SecureBoot
a Microsoft tool used to encrypt an entire computer’s hard drive or removable storage disk, to protect the drive contents from malicious offline attacks
BitLocker
BitLocker requires what
a system partition. 100 MB volume and
operating system partition
Which BitLocker partition is encrypted
operating system partition
a tool used in Windows for encrypting individual files
encrypting file services (EFS)
EFS can only be performed on
NTFS partitions
a secure communication channel between two hosts
VPN
common protocols used for establishing a VPN connection
IPSec
PPTP
L2TP
this protocol can be added to another protocols to provide security and encryption
secure sockets layers (SSL)
a device, or software, that inspects network traffic and allows or blocks traffic based on a set of rules
firewall
this type of firewall inspects traffic as it flows between networks.
network based firewalls
this type of firewall inspects traffic received by a specific host.
host based firewall
firewalls use ____ to identify allowed and blocked traffic
ACL’s