Lesson 10 - Using Support and Scripting Tools Flashcards

(41 cards)

1
Q

What is VNC?

A

Virtual Network Computing is a remote access tool and protocol. VNC is the basis of macOS screen-sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the default TCP port for a Remote Desktop server?

A

Port 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is MSRA?

A

Microsoft Remote Assistance is a Windows remote-support feature allowing a user to invite a technical support professional to provide assistance over a network using chat. The user can also grant the support professional control over his or her desktop. Remote Assistance uses the same RDP protocol as Remote Desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Windows feature Quick Assist?

A

Quick Assist is a Windows support feature allowing remote screen-sharing over the internet. Replaces MSRA and can be accessed by (CTRL+START+Q). Quick Assist works over the encrypted HTTPS port TCP/443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SSH?

A

Secure Shell is an application protocol supporting secure tunneling and remote terminal emulation and file copy. SSH runs over TCP port 22. SSH uses encryption to protect each session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two general classes of tools that provide enterprise monitoring and remote access?

A

-Remote monitoring and management (RMM)
-Desktop management or unified endpoint management (UEM)/mobile-device management (MDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are updating a procedure that lists security considerations for remote access technologies. One of the precautions is to check that remote access ports have not been opened on the firewall without authorization. Which default port for VNC needs to be monitored?

A

Virtual Network Computing (VNC) uses TCP port 5900 by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false? You can configure a web server running on Linux to accept remote terminal connections from clients without using passwords.

A

True. This can be configured using public key authentication with the Secure Shell (SSH) protocol. The server can be installed with the public keys of authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are joining a new startup business that will perform outsourced IT management for client firms. You have been asked to identify an appropriate software solution for off-site support and to ensure that service level agreement (SLA) metrics for downtime incidents are adhered to. What general class of remote access technology will be most suitable?

A

Remote monitoring and management (RMM) tools are principally designed for use by managed service providers (MSPs). As well as remote access and monitoring, this class of tools supports management of multiple client accounts and billing/reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Users working from home need to be able to access a PC on the corporate network via RDP. What technology will enable this without having to open the RDP port to Internet access?

A

Configure a virtual private network (VPN) so that remote users can connect to the corporate LAN and then launch the remote desktop protocol (RDP) client to connect to the office PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two main factors that govern backup operations?

A

-Frequency (period between backup jobs)
-Retention (period that any given backup job is kept for)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a backup chain?

A

A backup chain is a sequence of jobs starting with a full backup and followed by either incremental or differential backups to implement a media rotation scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three main types of backups?

A
  • Full only: the backup job produces a file that contains all the data from the source
  • Full with incremental: the chain starts with a full backup and then runs incremental jobs that select only new files and files modified since the previous job.
  • Full with differential: the chain starts with a full backup and then runs differential jobs that select new files and files modified since the original full job.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a synthetic full backup?

A

A synthetic full backup is a job type that combines incremental backup jobs to synthesize a full backup job. Synthetic full backups have the advantage of being easy to restore from while also being easy on bandwidth across the network as only changes are transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the GFS backup rotation scheme?

A

GFS: Grandfather-father-son is a backup rotation scheme that labels tapes/devices used for backup jobs in generations, with the youngest generation having a shorter retention period than the oldest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the 3-2-1 backup rule?

A

Backup best practice states that at any given time there should be at least three copies of data stored on two media types, with one copy held off site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What backup issue does the synthetic job type address?

A

A synthetic full backup reduces data transfer requirements and, therefore, backup job time by synthesizing a full backup from previous incremental backups rather than directly from the source data.

18
Q

You are documenting workstation backup and recovery methods and want to include the 3-2-1 backup rule. What is this rule?

A

It states that you should have three copies of your data across two media types, with one copy held offline and off site. The production data counts as one copy.

19
Q

For which backup/restore issue is a cloud-based backup service an effective solution?

A

The issue of provisioning an off-site copy of a backup. Cloud storage can also provide extra capacity.

20
Q

What frequent tests should you perform to ensure the integrity of backup settings and media?

A

You can perform a test restore and validate the files. You can run an integrity check on the media by using, for example, chkdsk on a hard drive used for backup. Backup software can often be configured to perform an integrity check on each file during a backup operation. You can also perform an audit of files included in a backup against a list of source files to ensure that everything has been included.

21
Q

What is regulated data?

A

Regulated data is info that has storage- and handling- compliance requirements defined by national and state legislation and/or industry regulations.

22
Q

What is PII?

A

Personally identifiable information (PII) is data that can be used to identify, contact, or locate an individual or to impersonate them.

23
Q

What is Personal Government-issued Information?

A

Personal Government-issued Information is issued to individuals by federal or state government is also PII

25
What is considered prohibited content?
Prohibited content is any information that is not applicable to work.
26
What is the EULA?
End-user license agreement is the contract governing the installation and use of software.
27
What is DRM?
Digital rights management is copyright protection technologies for digital media. DRM solutions usually try to restrict the number of devices allowed for playback of a licensed digital file, ie music or ebook.
28
What is an IRP?
An incident response plan is a set of procedures and guidelines for dealing with security incidents.
29
What is a CSIRT?
Computer Security Incident Response Team is a team with responsibility for incident response
30
What is digital forensics?
Digital forensics is the science of collecting evidence from computer systems to a standard that will be accepted in a court of law.
31
What is data sanitization?
The process of thoroughly and completely removing data from a storage medium so that file remnants cannot be recovered.
32
How does disk erasing/wiping software work?
Disk erasing/wiping software ensures that old data is destroyed by writing to each location on a hard disk drive, either using zeros or in a random pattern leaving the disk "clean" and ready for new user.
33
What is a Secure Erase (SE)?
Secure Erase (SE) performs zero-filling on HDDs and marks all blocks as empty on SSDs. The SSD firmware's automatic garbage collectors then perform the actual erase of each block over time. If this process is not completed (and there is no progress indicator), there is a risk of remnant recovery, though this requires removing the chips from the device to analyze them in specialist hardware.
34
What is Instant Secure Erase (ISE)?
Instant Secure Erase (ISE)/Crypto Erase uses the capabilities of self-encrypting drives (SEDs) as a reliable sanitization method for both HDDs and SSDs. An SED encrypts all its contents by using a media encryption key (MEK). Crypto Erase destroys this key, rendering the encrypted data unrecoverable.
35
What are the three types of physical destruction?
- Shredding - Incinerating - Degaussing (exposed to powerful electromagnet)
36
You are updating data handling guidance to help employees recognize different types of regulated data. What examples could you add to help identify healthcare data?
Personal healthcare data is medical records, insurance forms, hospital/laboratory test results, and so on. Healthcare information is also present in de-identified or anonymized data sets.
37
An employee has a private license for a graphics editing application that was bundled with the purchase of a digital camera. The employee needs to use this temporarily for a project and installs it on her computer at work. Is this a valid use of the license?
No. The license is likely to permit installation to only one computer at a time. It might or might not prohibit commercial use, but regardless of the license terms, any installation of software must be managed by the IT department.
38
Why are the actions of a first responder critical in the context of a forensic investigation?
Digital evidence is difficult to capture in a form that demonstrates that it has not been tampered with. Documentation of the scene and proper procedures are crucial.
39
What does chain-of-custody documentation prove?
Who has had access to evidence collected from a crime scene and where and how it has been stored.
40
Your organization is donating workstations to a local college. The workstations have a mix of HDD and SSD fixed disks. There is a proposal to use a Windows boot disk to delete the partition information for each disk. What factors must be considered before proceeding with this method?
Using standard formatting tools will leave data remnants that could be recovered in some circumstances. This might not be considered high risk, but it would be safer to use a vendor low-level format tool with support for Secure Erase or Crypto Erase.
41