12-3 Flashcards

1
Q

___________ have built in firewalls capable of blocking certain ports

A

windows and Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Another phase of assessing systems security is protection. This means you need to ensure that all reasonable ____________ are being employed. this includes tools such as IDS.

A

protective software and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDS are the only way to know of impending _________

A

attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___________ not only mask your internal IP address but most proxy servers allow you to discover what websites users visit and put on filters.

A

proxy serves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

when assessing the protection of the network, check to see whether the following items are present

A
firewall
AV protection
Anti Spyware
IDS
Proxy Server or NAT
Data transmission encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical security needs to be considered. Servers may be locked and secured at the end of the day but most computers are left ___________ at work.

A

unsecured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backups should be stored in a fireproof safe, and old backups should be ______________

A

destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this room should be kept locked, in the most fireresistent room in the bldg. access should be restricted. access control and tacking should be in place.

A

server rooms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

these should have an engraved ID mark. routinely inventory them. normally not physically possible to secure in place.

A

workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this is a process of scanning the well knows ports __________ or all ports _______ to see which ports are open.

A

1024 // 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this is a process whereby the attacker tries to find out what is on the target network.

A

enumerating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this is the use of some tool to seek out known vulnerabilities or the attacker might try to manually assess vulnerability.

A

vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this scanner is not necessarily the most widely used, but it’s easy to use. its methodical but slow. you select an host IP you want to scan. this will search for open ports

A

Netcop scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a port scanner that provides additional information. it will give you open ports as well as other vital information

A

netbrute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

widely used scanning utilities. available as a free download. simple and informative.

A

Cerberus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly