Chapter 10 Security Flashcards

1
Q

What are two types of Security Threats?

10.0.1.1

A

Internal threats - Users and employees who have access to data, equipment, and the network

External threats - Users outside of an organization who do not have authorized access to the network or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are two types of attacks?

10.0.1.1

A

Physical - Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring

Data - Events or attacks that remove, corrupt, deny access to authorized users, allow access to unauthorized users, or steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are four types of security threats that infect your computer?
10.1.1.1

A

Adware
Spyware
Grayware
Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Adware?

10.1.1.1

A

Adware is a software program that displays advertising on your computer. Adware is usually distributed with downloaded software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Spyware?

10.1.1.1

A

Spyware is installed and running, it monitors activity on the computer. The spyware then sends this information to the individual or organization responsible for launching the spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Grayware?

10.1.1.1

A

Grayware may be malicious and is sometimes installed with the user’s consent. For example, a free software program may require the installation of a toolbar that displays advertising or tracks a user’s website history.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Phishing?

10.1.1.1

A

Phishing is where the attacker pretends to represent a legitimate outside organization, such as a bank. A potential victim is contacted via email, telephone, or text message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Denial of Service (DoS)?

10.1.1.6

A

DoS works by sending so many requests for a system resource that the requested service is overloaded and ceases to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Distributed DoS (DDoS)?

10.1.1.6

A

A DDoS attack uses many infected computers, called zombies or botnets, to launch an attack. The intent is to obstruct or overwhelm access to the targeted server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a SYN Flood?

10.1.1.6

A

A SYN request is the initial communication sent to establish a TCP connection. A SYN flood attack randomly opens TCP ports at the source of the attack and ties up the network equipment or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Spoofing?

10.1.1.6

A

In a spoofing attack, a computer pretends to be a trusted computer to gain access to resources. The computer uses a forged IP or MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Man-in-the-Middle?

10.1.1.6

A

An attacker performs a Man-in-the-middle attack by intercepting communications between computers to steal information transiting through the network. A Man-in-the-middle attack could also be used to manipulate messages and relay false information between hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Replay?

10.1.1.6

A

To perform a replay attack, data transmissions are intercepted and recorded by an attacker. These transmissions are then replayed to the destination computer. The destination computer handles these replayed transmissions as authentic and sent by the original source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DNS Poisoning?

10.1.1.6

A

DNS records on a system are changed to point to imposter servers. The user attempts to access a legitimate site, but traffic is diverted to an imposter site. The imposter site is used to capture confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Social Engineering?

10.1.2.1

A

Social engineering occurs when an attacker tries to gain access to equipment or a network by tricking people into providing the necessary access information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Data wiping?

10.1.2.2

A

Data wiping, also known as secure erase, is a procedure performed to permanently delete data from a hard drive.

17
Q

What is Degaussing?

10.1.2.2.

A

Degaussing disrupts or eliminates the magnetic field on a hard drive that allow for the storage of data. An electromagnet is a magnet, that when a current is applied, its magnetic.

18
Q

What is a security Policy?

10.2.1.1

A

A security policy is a collection of rules, guidelines, and checklists. Network technicians and managers of an organization work together to develop the rules and guidelines for the security needs of computer equipment.

19
Q

What is Principle of Least Privilege?

10.2.1.6

A

Users should be limited to only the resources they need in a computer system or on a network.

20
Q

What is EFS?

10.2.2.4

A

Encrypting File System

21
Q

What is Hash Encoding?

10.2.4.1

A

Hash encoding, or hashing, ensures that messages are not corrupted or tampered with during transmission. Hashing uses a mathematical function to create a numeric value that is unique to the data.

22
Q

What are Three Types of Hashing?

10.2.4.1

A

Secure Hash Algorithm (SHA)
Message Digest 5 (MD5)
Data Encryption Standard (DES)

23
Q

What is Symmetric Encryption?

10.2.4.1

A

Symmetric Encryption requires both sides of an encrypted conversation to use an encryption key to encode and decode the data. The sender and receiver must use identical keys.

24
Q

What is Asymmetric Encryption?

10.2.4.1

A

Asymmetric encryption requires two keys, a private key and a public key. The public key can be widely distributed, including emailing in cleartext or posting on the web.

25
Q

What is SSID stand for?

10.2.4.2

A

Service Set Identifier (SSID)

26
Q

What is Service Set Identifier (SSID)?

A

Service Set Identifier (SSID) is the name of the wireless network. A wireless router or access point broadcasts the SSID by default so that wireless devices can detect the wireless network.

27
Q

What does WEP stand for?

10.2.4.4

A

Wired Equivalent Privacy (WEP)

28
Q

What is Wired Equivalent Privacy (WEP)

10.2.4.4.

A

The first generation security standard for wireless. Attackers quickly discovered that WEP encryption was easy to break.

29
Q
What does (WPA) stand for?
10.2.4.4
A

Wi-Fi Protected Access (WPA)

30
Q

What is Wi-Fi Protected Access (WPA)

A

An improved version of WEP, WPA covers the entire 802.11i standard (a security layer for wireless systems). WPA uses much stronger encryption than WEP encryption.

31
Q

What does WPA2 stand for?

10.2.4.4

A

Wi-Fi Protected Access 2 (WPA2)

32
Q

What is Wi-Fi Protected Access 2 (WPA2)

10.2.4.4

A

An improved version of WPA. This protocol introduces higher levels of security than WPA. WPA2 supports robust encryption, providing government-grade security. WPA2 has two versions: Personal (password authentication) and Enterprise (server authentication).

33
Q

What is Temporal Key Integrity Protocol (TKIP)

10.2.4.4

A

This technology changes the encryption key on a per packet basis and provides a method to check the integrity of messages.

34
Q

What is Extensible Authentication Protocol (EAP)

10.2.4.4

A

Uses a centralized authentication server to increase security.

35
Q

What is Protected Extensible Authentication Protocol (PEAP)

10.2.4.4

A

A protocol that does not use a certificate server.

36
Q

Advanced Encryption Standard (AES)

10.2.4.4

A

A symmetric key encryption method added to WPA2 only.

37
Q

What is a Hardware firewall?

10.2.4.7

A

Hardware firewall is a physical filtering component that inspects data packets from the network before they reach computers and other devices on a network. A hardware firewall is a freestanding unit that does not use the resources of the computers it is protecting