Security Flashcards
Which term is used in reference to the process of identifying an individual?
Authentication
Which term is used in reference to the process in which a user is identified via a username and password?
Authentication
Which term is used in reference to the process of giving individual access to a system or resource?
Authorization
Which term is used in reference to the process of keeping track of a users activity?
Accounting
Which term is used in reference to the process that prevents someone from denying that she accessed a resource?
Nonrepudiation
Which of the following is a secret numeric password used for authentication?
Pin
Why type of electronic document contains a public key?
Digital certificate
Which item is roughly the size of a credit card and allows access to a network and its resources?
Smart card
Which type of authentication method identifies and recognizes people based on physical traits such as fingerprints ?
Biometrics
Which authentication type is the default for active directory ?
Kerberos
Which directory service is used with windows domains?
Active directory
Which type of server runs active directory ?
Domain controller
When you access permissions to a folder, you should first grant permissions to _____ rather than users.
Groups
When you create a local user on a computer running in Windows 7, where is the user account stored?
SAM
Which type of group can be granted rights and permissions?
Security
Which of the following authorizes a user to perform certain actions in Windows, such as logging on or performing a backup?
Right
When you grant access to print to a printer, which of the following are you granting?
Permission
In which of the following locations are users and permissions stored for an NFTS folder?
Registry
Which type of permissions are assigned directly to a file or folder?
Explicit
Which of the following is the process of converting data into a format that cannot be read by another user?
Encryption
Which authentication method sends the username and password in plain text?
PAP
In Windows, which of the following is used to enable auditing?
NTCS permissions
By default, the _____ group has full access to all resources within a domain.
Domain admins
_______ allows you to log on once and access multiple related by different systems without having to log on again
Single sign on (SSO)
Which of the following is the most common form of authentication?
Password
Which of the following is true of using passwords ?
You should create a strong password
Which of the following best describes a password that is at least seven characters long and uses three of the following categories (uppercase, lowercase, numbers, and special characters)?
Complex password
Which of the following is used to define the length of a password in Windows ?
Group policies
Which of the following is not a complex password?
John!taylor
Which settings are used to keep track of incorrect login attempts and lock the account if too many attempts are detected within a certain set time?
Account lockout
Which setting is used to prevent users from reusing the same the same password over and over?
Password history
Which setting forces users to change their passwords?
Maximum password age
Which type of attack tries to guess passwords by trying common words?
Dictionary attack
Which type of attack tried to guess passwords by every combination of characters?
Brute-force attack
Which malicious software captures every keystone and sends it to a hacker?
Keylogger
Which type of software can you use to view usernames and passwords broadcasted over the network?
Sniffer
Which of the following is the generally accepted minimum password length?
8
Which of the following are the only passwords that should not expire?
Service accounts
Which of the following should users do not do when dealing with passwords?
Write down your password in a piece of paper and keep it near your computer
Do not use names of children and pets
Do not give your password to your co-workers
Describe what might happen if you require passwords to be too long
User will try to circumvent the password
What limits how fast a password for an encrypted file is cracked?
The speed of your computer, particularly your processor
What steps can you do to prevent someone from hacking your password?
Use strong passwords and change them frequently.
What is used to prevent someone from guessing a password multiple times?
Account lockout settings
Which type of device device isolated by filtering the packets that can enter it?
Firewall
Which seven layer model is often used to describe networking technologies and services?
OSI
On which OSI layer do routers function?
3
Network layer
On which OSI layer do TCP and UDP function?
4
transport layer
Which OSI layer is used by switches and bridges?
2
Data link layer
Which port is used by smtp?
25
Which port is used by LDAP?
389
Which type of firewall filters packets based on IP address and ports?
Packet-filtering
Which type of firewall is also known as a proxy server?
Application-level
Which type of firewall looks at the previous conversations to determine if a packet should enter a network?
Stateful
Which type of DoS attack uses large ICMP packets to cause an overflow of the memory buffers allocated for packets ?
Ping of death
Which technology can be used to isolate a network of servers so that they cannot interact with other servers?
VLAN
Which type of device looks at a packet and forwards it based on its destination IP address?
Router
Which type of routing protocol sends the entire routing table to its neighbors?
Distance vector
Which type of system detects unauthorized intruders and then takes action to stop them from proceeding ?
IPS
Which type of server can be used to trap a hacker?
Honeypot
Which special area serves as a buffer area between the internet and the internal network and can be used to hold web servers that are accessed from the internet?
DMZ
How many firewalls should be used to create a sandwich DMZ?
2
You administer several internet web servers that need to communicate with a SQL server. Where should the SQL server be placed?
Internal network
Which of the following servers should not be placed on the DMZ?
Email mailbox servers
Which technology allows a user at home to connect to the corporate network?
VPN
Which IPSec protocol provides integrity protection for packet headers, data, and user authentication but does not encrypt the data load?
AH
Authentication header
Which type of malware can copy itself and infect a computer without the users consent or knowledge?
Virus
Which type of self-replicating program copies itself to other computers on a network without any user intervention and consumes bandwidth and computer resources?
Worm
Which type of malware looks like a useful or desired executable programs but is in reality program that is supposed to cause harm to your computer or steal information from your computer?
Trojan horse
Which type of malware collects your personal information or details about your browsing habits without your knowledge?
Spyware
Which type of malware provides administrator level control over a computer system?
Root kit
Which software component defends against spyware ?
Windows defender
Which term is used in reference to a message warning you to delete an essential windows file?
Virus hoax
Which server can be used to install windows updates for your organization?
WSUS
Windows server update service
Which term is used in reference to multiple windows updated that have been packaged together as one installation and are well tested ?
Service packs
Which windows feature notifies you when something tries make changes to your computer without your knowledge?
User account control
UAC
Which host firewall is included with Windows 10?
Windows firewall
Which term is used in reference to unsolicited junk email?
Spam
Which email validation system is designed to stop spam that uses source address spoofing?
Sender policy framework
Which of the following are spammers and hackers looking for when they want to send email through your network?
Open smtp servers
Which tab internet explorer settings is used to delete history and cookies?
General
Which internet explorer zone is the least secure ?
Local intranet zone
Which technique is used to send you to a fake, but realistic-looking, website to verify your account information?
Phishing
____ is software that is designed to infiltrate or affect a computer system without the owners informed consent.
Malware
A _________ is program that provides a user with remote, unauthorized control or a system or unities an unauthorized task.
Backdoor
Which of the following terms indicates that information is to be read only by those people for whom it is intended?
Confidentiality
Which technology is not used to implement confidentiality?
Auditing
Which of the following ensures data is not changed when it not supposed to be?
Integrity
Which of the following is not a response when dealing with a risk?
Patching
Which the following terms is used in reference to the security discipline that requires that a user is given no more privilege than what is deemed necessary to perform his job?
Principle of least privilege
Which of the following terms is used in reference to a scope that hacker can use to break into a system ?
Attack surface
Which of the following method whereby a hacker relies on the trusting nature of the person being attacked?
Social engineering
Which of the following is considered the most effective way to protect against social engineering?
Employee awareness
Which of the following is necessary to highly secure a system ?
More money
Which of the following is the first line of defense when setting up a network ?
Physically secure the network
Which concept determines what resources users can access after they log on?
Access control
Which of the following is used to provide protection when one line of defense is breached?
Defense in depth
Which of the following is used to identify a person before giving access ?
Authentication
Which of the following is used to verify that an administrator is not accessing data that he should not be accessing?
Auditing
Which type of device can be easily lost or stolen or can be used for espionage ?
Removable devices
Which of the following is a physical or logical device used to capture keystrokes ?
Keylogger
In dealing with risks, which response is accomplished when you or your organization purchased insurance to protect your bottom line when such a disaster or threat is realized?
Risk transfer
A _____ is generally defined as the probability that an even will occur that can cause harm to a computer system, service or network.
Risk
Throughout the past couple of years small _________ have been one of the largest challenges facing security professionals.
Mobile devices
What do the initials CIA stand for in relation to security?
Confidentiality, integrity and availability