chapter 17/ Security Flashcards

1
Q

common prevention methods

779

A

physical security, digital security, users education, and the principle of the last privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

your system should have the minimum of how many barriers?

800

A

Three

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some of the physical security/

800

A

lock doors, Tailgating, Securing physical documents/ password/ shredding, biometrics, badges, Key fobs, FRID Badges, RSA Tokens, privacy filters, Retinal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Biometrics systems include what?

801

A

fingerprint, palm, hands canners, retinal scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital security

802

A

it focuses on keeping harmful data and malware out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Antivirus software?

802

A

An antivirus program is a software utility designed to protect your computer or network against computer viruses. If and when a virus is detected, the computer displays a warning asking what action should be done, often giving the options to remove, ignore, or move the file to the vault.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what can a virus do to a computer with out an Antivirus?

802

A

If a virus infected a computer without an antivirus program, it may delete files, prevent access to files, send spam, spy on you, or perform other malicious actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a firewall

803

A

A firewall is a software utility or hardware device that limits outside network access to a computer or local network by blocking or restricting network ports. Firewalls are a great step for helping prevent un-authorized access to a company or home network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

packet filter firewall

804

A

packet filtering is the process of passing or blocking packets at a network interface based on source and destination addresses, ports, or protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

proxy firewall

804

A

the proxy firewall provide better security then the packet filter firewall because of the increased intelligence that the proxy firewall offers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

stateful inspection firewall

A

it keep track of how information is routed or used, using a state table that tracks every communication channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of Service DoS and distributed Denial of Service DDoS

806

A

Denial of Service, a DoS attack is a method of attacking a networked computer by sending it an abnormally high number of requests, causing its network to slow down or fail. Since a single individual cannot generate enough traffic for a DoS attack, these attacks are usually run from multiple computers infected by worms or zombie computers for a DDoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

antispyware

806

A

anti-spyware programs help to block and prevent spyware and other malware infections on computers. Anti-spyware programs monitor incoming data from email, websites, and downloads of files and stop spyware programs from getting a foothold in the computer operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a computer virus.

812

A

A computer virus is a program, script, or macro designed to cause damage, steal personal information, modify data, send e-mail, display messages, and infect other computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

some of viruses symptoms are.

812

A

system start to loud slowly.
some of the files disappears from the system.
lose access to the disk, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

virus tries to accomplish one of two things ?

813

A

Render the system inoperable and spread to other systems.

17
Q

many viruses today are spread using what ?

813

A

Email

18
Q

armored virus

814

A

it make itself difficult to detect or analyze, it cover itself with protective code that stops debuggers or disassemblers from examining it.

19
Q

companion virus

815

A

it attaches it self to legitimate programs and creates a program with a different file name

20
Q

macro Virus

815

A

Macro virus is a computer virus that spreads to other computers through software programs that utilize macros. For example, Microsoft Word and Microsoft Excel are two popular and widely used programs that are capable of executing macros. Macro viruses written for these programs can spread by infecting other related documents each time the document is open. Because these files are commonly used and sent through e-mail, a computer network can be quickly infected by these viruses.

21
Q

multipartite virus

815

A

it attacks the system in multiple ways, it may infect the boot sector, all the files and destroy application files.

22
Q

phage virus

815

A

it alters other programs and databases, the virus infects all of these files, the only way to remove this virus is to reinstall the program that are infected.

23
Q

polymorphic virus

816

A

A virus that changes its virus form (signature) every time it replicates and infects a new file in order to keep from being detected by an antivirus program.

24
Q

retrovirus

816

A

a computer retrovirus is one that actively seeks out an antivirus program on a computer system and attacks it. A retrovirus will attempt to disable and infect the antivirus software in order to avoid detection in the computer system. Also called anti-antivirus virus.

25
Q

Stealth virus

816

A

it avoid detection by masking itself from application, it may attached to a boot sector of the hard drive

26
Q

worms

817

A

a worm is a destructive self replicating program containing code capable of gaining access to computers or networks. Once within the computer or network, the worm causes harm by deleting, modifying, distributing, or otherwise manipulating data.

27
Q

Trojans

818

A

A trojan horse is a program that appears to be something safe, but in is performing tasks such as giving access to your computer or sending personal information to other computers. Trojan horses are one of the most common methods a criminal uses to infect your computer and collect personal information from your computer.

28
Q

Workstation security best practices

818

A
set strong passwords
required password
restrict user permissions
change default username
disable the guest account
make the screensaver require a password
disable auto run functionality
29
Q

Destruction and disposal methods

821

A

we should never tossed away a hard drive. we need to be careful with all the data that is in it and for that we need to do Formatting, Sanitation and distraction.

30
Q

Low level format / standard format

821

A

Low level format is an initial formatting of a hard drive that initializes the physical tracks on the surface or the internal disks. The drive manufacturer performs a low-level format on the hard drive before it is released and is not something an end-user needs to do to their hard drive.

31
Q

hard drive sanitation and sanitation methods

822

A

some hard drive come with AES advanced encryption standard.
erase the hard drive
if it is a SATA we run HDDERASE
the surefire one the eradicated of the hard drive.

32
Q

overwrite

822

A

overwrite is a term used to describe when new information replaces old information or data.

33
Q

drive wipe

822

A

the hard drive does not contain any data that it is clean.

34
Q

Securing a SOHO wireless network

824

A

changing the default SSID (Service Set Identifier)
disable SSID
Disable the DHCP (Dynamic Host Configuration Protocol)
use MAC filter
Use IP filter
use the strongest security

35
Q

antenna and access point placement

826

A

we avoid placing access points near metal or near the ground. they should be placed in the center of the area to be served and high enough to get around most obstacles.