2 Flashcards

(23 cards)

1
Q

Which of the following configuration changes does NOT reduce the attack surface?

A. Removing unwanted and unnecessary software
B. Closing unnecessary network ports
C. Disabling unused OS features and services
D. Configuring data back-ups in case ransomware encrypts the file system

A

D. Configuring data back-ups in case ransomware encrypts the file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main difference between virus and worm malware?

A

A virus propagates in memory and over computer networks whereas a worm has to infect a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How might malware hosted on a website be able to infect your computer simply by you browsing the site?

A. By exploiting a human vulnerability related to deception
B. By exploiting outdated hardware installed in the computer chassis
C. By exploiting an improperly configured firewall
D. By exploiting a vulnerability in software installed on your computer

A

D. By exploiting a vulnerability in software installed on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does SSL stand for?

A

Secure Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is spyware usually leveraged to steal passowrds?

A

By monitoring keystrokes or stealing a password database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main means by which anti-virus software identifies infected files?

A

Using definitions or signatures of know virus code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two main ways that spam might expose recipients to hazardous content?

A

attachments
hyperlinks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your friend sent you an email link, which you have opened, and now the browser is asking whether you should install a plug-in to view all the content on the page. What should you do next?

A

Check whether your friend actually sent the link in good faith first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a reputable source of management software and drivers for a particular system?

A

An OEM website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does OEM stand for?

A

Original equipment manufacturer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the set of technical controls that govern how subjects may interact with objects?

A

access control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do you call users or software processes or anything else that can request and be granted access to a resource?

A

subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In computer security, the basis of access control is usually an __________.

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does ACL stand for?

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An ACL is a list of subjects and the rights or __________ they have been granted on the object.

A

permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An access control system is usually described in terms of four main processes: what are they?

A

identification
authentication
authorization
accounting

17
Q

There are four main access control system processes ( accounting, authorization authentication, identification) which is being described below?

Determining what rights or permissions subjects should have on each resource and enforcing those rights.

A

authorization

18
Q

There are four main access control system processes ( accounting, authorization authentication, identification) which is being described below?

Tracking authorized and unauthorized usage of a resource or use of rights by a subject.

19
Q

There are four main access control system processes ( accounting, authorization authentication, identification) which is being described below?

Proving that a subject is who or what it claims to be when it attempts to access the resource.

A

authentication

20
Q

There are four main access control system processes ( accounting, authorization authentication, identification) which is being described below?

Creating an account or ID that identifies the user or process on the computer system.

A

identification

21
Q

What principle means that a user should be granted rights necessary to perform their job and no more?

A

least privilege

22
Q

What principle means that unless there is a rule specifying that access should be granted, any request for access is denied?

A

implicit deny