Module 9.1 Flashcards

(33 cards)

1
Q

What does an organization need to do to harden an operating system and keep it secure?

A

A good administrator will:

  • Configure the operating system to protect against outside threats.
  • Remove any unnecessary programs and services.
  • Ensure that security patches and updates are installed in a timely manner to correct faults and mitigate risks.

An organization should:

  • Maintain a systematic approach for addressing system updates.
  • Establish procedures for monitoring security-related information.
  • Evaluate updates for applicability.
  • Plan the installation of application updates and patches.
  • Install updates using a documented plan.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Another critical way to secure an operating system is to identify potential vulnerabilities.
  • Establish this to compare how a system is performing against baseline expectations.
A

A Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This antivirus product can appear while internet browsing and most display an ad or popup that looks like an actual Windows warning. Clicking anywhere inside the window may download and install malware instead.

A

Watch out for rogue antivirus products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Uses legitimate programs to infect a computer. These viruses are hard to detect and use scripting languages such as Windows PowerShell.

A

Fileless attacks are difficult to detect and remove

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scripting languages such as Python, Bash (the command-line language for Apple’s macOS and most Linux distributions) or Visual Basic for Applications (or VBA, used in Microsoft macros) can be used to create scripts that are malware.

A

Scripts can also be malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unapproved or non-compliant software may be unintentionally installed on a computer. It can interfere with the organization’s software or network services and should be removed immediately.

A

Always remove unapproved software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Patch Management

A
  • To stay one step ahead of cybercriminals, keep systems secure and up to date by regularly installing patches.
  • Patches are code updates that prevent a new virus, worm, or other malware from making a successful attack.
  • Operating systems such as Windows routinely check for updates that can protect a computer from the latest security threats.
  • As a cybersecurity professional, it’s good practice to test a patch before deploying it throughout the organization.
  • A patch management tool can be used to manage patches locally instead of using the vendor’s online update service.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Patch Management benefits

A
  • Administrators can approve or decline updates.
  • Administrators can force the update of systems on a specific date.
  • Administrators can obtain reports on the update(s) needed by each system.
  • There is no need for each computer to connect to the vendor’s service to download patches; instead, it gets the verified update from a local server.
  • Users cannot disable or circumvent updates.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It runs on a device to restrict incoming and outgoing network activity for that device.

A

Host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A software installed on a device or server to monitor suspicious activity and detect malicious requests.

A

Host-intrusion detection system (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A software that monitors a device for known attacks and anomalies (deviations in bandwidth, protocols and ports), or finds red flags by assessing the actual protocols in packets.

A

Host-intrusion prevention system (HIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Integrated security solution that continuously monitors, collects and analyzes data from an endpoint device and responds to any threats it detects.

A

Endpoint detection and response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

provide a centralized way to ensure that sensitive data is not lost, misused or accessed by unauthorized users.

A

Data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network security device that combines a traditional firewall with
other network-device-filtering functions.

A

Next-generation firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Windows feature allows users to encrypt files, folders, or an
entire hard drive.

A

Encrypting File System (EFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

encrypts the entire contents of a drive (including temporary files and
memory).

A

Full disk encryption (FDE)

17
Q

A specialized chip on the motherboard that stores information about the host system, such as encryption keys, digital certificates, and passwords.

A

Trusted Platform Module (TPM)

18
Q

Ensures that the system can be trusted and has not been altered while the operating system loads.

A

Boot integrity

19
Q

Stored on a small memory chip on the motherboard. The BIOS is the first program that runs when you turn on the computer.

A

Firmware (software instructions about basic computer functions)

20
Q

A newer version of BIOS, defines a standard interface between the operating system, firmware, and external devices.

A

Unified Extensible Firmware Interface (UEFI)

21
Q

A security standard to ensure that a device boots using trusted software.

22
Q

Provides stronger validation than Secure Boot

A

Measured Boot

23
Q

The hardware platform has enhanced security features such as a special CPU, boot, and a dedicated AES encryption engine.

A

Security-focused hardware

24
Q

Apple Data Protection and FileVault data storage encryption are
supported by the hardware-based AES encryption engine.

A

Encrypted storage

25
The Boot ROM protects low-level hardware and only allows genuine and unaltered Apple OS software to run.
Secure boot
26
Processed in the security hardware system. This keeps it segregated from the OS and running application software, including malware.
Secure biometric data
27
Helps find lost or stolen macOS devices through its location tracking function. It also enables remote device locking and storage erasing if critical data is at risk.
Find My Mac
28
Antimalware technology prevents the execution of malware through signature-based malware detection. It also alerts users to the existence of malware and provides the option to remove detected malware files.
XProtect
29
Detects and removes existing malware infections when detection rules are automatically updated by Apple. It also monitors for malware infections at system restart and user login.
Malware Removal Tool (MRT)
30
Ensures that only authentic, digitally-signed software that has been created by an Apple-notarized software developer is permitted to be installed.
Gatekeeper
31
* Use cable locks to secure devices * Keep telecommunication rooms locked * Use security cages (Faraday cages) around equipment to block electromagnetic fields.
Computer Equipment
32
* A standard keyed entry lock is the most common type of door lock and are often easy to force open. * A deadbolt lock can be added for extra security. * A cipher lock uses buttons that are pressed in a given sequence to open the door.
Door locks
33
* RFID uses radio waves to identify and track objects. * RFID tags are small, require little power, contain an integrated circuit connecting to an antenna, and can be attached to any item that an organization wants to track.
Radio frequency identification (RFID) systems