Security: Compare and contrast common prevention methods Flashcards
Which password policy setting allows you to configure how many new passwords must be created before an old one can be reused?
Password history
When you log in remotely, you must provide a username, password, and smart card. How many factors of authentication is this?
Two factor
Although three items are presented, two items are something you know, and one is something you have
What is a T-bar lock used for?
Securing a laptop to a physical object such as a desk
______ allows users to freely access all systems to which their account has been granted access after the initial authentication
Single sign on
What method is the most secure for distributing passwords to employees?
a. issue the same password to all users, upon logon, force users to change their password
b. send an e-mail to each user that contains their password
c. instruct users to report to their IT department with proper identification for password setup
d. instruct users to request passwords via email
c. instruct users to report to the IT department with proper identification for password setup
A ______ is a physical token that is a one time password issued by a security device. The token is used to access network resources
RSA token
A _____ is a setup with two doors and a small room between them.
The first door requires authentication to access the small room.
The second verification will occur to allow the user through the second door, which can only be opened once the first door is closed
Mantrap
After determining the scope of a user’s job, what is the next step in implementing the principle of least privilege?
Determine the minimum set of privileges needed to perform the user’s job
What is the aim of security awareness training?
To ensure all employees understand security responsibilities
This is the best way to prevent social engineering attacks
_____ checks the identify of both ends of the connection, what authentication method does this?
Mutual authentication, sometimes known as two way authentication
What two methods are used to monitor access control violations?
- Audit logs
- Intrusion detection system
What is one of the highest levels of physical security?
Biometrics
A(n) _______ uses devices such as smart cards or bio-metrics to provide access to authorized persons and prevent unauthorized access to a room
Access control system
What is a smart card?
A hardware device that has an embedded microchip that contains authentication or security information
To provide authentication on a network that contains two servers, what should be implemented?
Usernames with strong passwords
_____ contain a microprocessor that stores information and are implemented with computers to improve network security
Smart cards
Usually, smart cards are read by card readers using radio waves
What is the best implementation of multi factor authentication?
a. smart card, username, PIN
b. username, strong password, PIN
c. biometrics, smart card, strong password
d. smart card, username, strong password
c. biometrics, smart card, strong password
What are some digital security methods?
- Anti virus software
- Firewalls
- User authentication with passwords
What are some physical security measures?
- Locked doors
- Guards
- Mantraps
- Shredding old documents
- Biometrics
- RFID badges
- RSA tokens
- Privacy filters
What are some methods you can take to guard against social engineering?
-User education
What are some wireless security methods?
- Changing default username and password
- Change SSID
- Set encryption
- Disable SSID broadcast
- enable MAC filtering
- Access point placement
- Power levels
- Static IP addresses to wireless routers
What are some data security methods?
- Hard drive formatting
- Sanitation
- Physical destruction
What is the purpose of a privacy filter?
A privacy filter attaches to your monitor to prevent others from viewing what you have on your monitor
The _______ involves ensuring users are given only the user rights they need to execute their authorized tasks
Principle of least privilege
Gaining unauthorized access to data by using another user’s credentials is an example of what?
Piggybacking
Piggybacking involves one party willingly sharing information to another, knowing it may be used in the future
What attributes can be used for biometric security?
- Voice
- Fingerprints
- Face
- Signature
- Retina
- Iris
- Hand geometry
What ports should be opened on a firewall to allow access to all types of web sites?
Port 80 (HTTP)
Port 443 (HTTPS)