Part 4 Flashcards

(102 cards)

1
Q

When an antivirus program detects a virus an option may be given to an administrator to remove, clean or ____ a file.

A

Quarentine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There are occasions when a file or program may exhibit behavior or coding that triggers a signature or behavior alert from an antimalware system often called?

A

False Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An algorithm or hash that is unique to a specific attack method or virus?

A

Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What scans continuously inspect files and email data for viruses as they are read from or written to a computer?

A

Auto Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the effectiveness of VSE depend on?

A

Scanning engine and definition DAT files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What prevents unwanted changes to your computer by retricting access to specified ports, files, shares etc?

A

Access Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How often on COMPOSE do Anti Virus scans run?

A

Daily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is real time monitoring for malicious activities?

A

Behavioral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a program that attaches itself to a file or another program?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a program that replicates and propogates itself without having to attach itself to a file or program.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three reasons privilage escalation can occur?

A
  • Error by administrator
  • weak password policy
  • bad coding in software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are additional security settings required?

A
  • Account lockout duration
  • minimum password length
  • disabling unnecessary services
  • “Allow administration by” option
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 4 types of Trojans?

A

Remote Access Trojan (RAT) : full or partial access to victim’s system

Data Sending : sends key strokes, passwords, cookies via email or back door

Destructive : deleting files, corrupting the OS, crashing the system, disable AV on the firewall

Proxy : jumping point for an attacker on another system to mask identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of Denial of Service attack?

A

Deny legitimate users from accessing infomation or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some signs of Denial of Service attack?

A
  • Spam
  • Unavailable website

“Flood”, slowing or stopping data transfer, consumption of disk space or processor time, disrupting routing info, disrupting physical network components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What involves exploiting the session between devices?

A

Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can you prevent session hijacking?

A
  • Use encryption
  • use secure protocol
  • limit incoming connections
  • minimize remote access
  • strong authentication
  • using switches over hubs
  • user training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How many user accounts should an admin have at minimum?

A

2

User and administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What command line run script launches GPO editor?

A

gpedit.msc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What provides the configuration setting of RBAC settings for installed applications?

A

Authorization Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What analyizes system configuration and applies security templates?

A

Security Configuration and Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

On a windows system, GPO editor seperates the local computer policy into two sections?

A
  • Computer configuration

- User configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What provides the options for setting system auditing, rights assigned to groups, and their users and security features such as device settings, log on requirements, account settings, network access etc?

A

Local Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What provides options for setting password complexity and length requirements as well as account lockout lengths and attempt frequencies?

A

Account Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Database cryptography must be compliant against what for authentication of DBMS?
FIPS 140-2
26
How can you protect databases from Denial of Service attacks?
- Limit the number of connections | - Database clustering
27
What should be implemented to limit exposure?
Role Based Access Control Policy
28
What are password complexity requirements?
- minimum length - # of upper and lower case letters - # of numeric characters - # of special characters - password history or reuse
29
How long can an account be inactive before it should be disabled?
35 days
30
What kind of permissions should a bind account have?
Full administrative access to the database
31
What type of account is used to connect an application to its database?
Bind account
32
Where do databases fall under?
Application Core SRG
33
What are the 4 core SRGs?
- Application - network infrastructure - operating system - policy
34
What are collections of requirements applicable to a given technology family?
SRG- Security Requirement Guides
35
What could result in the loss of privacy, corruption of data, breach national security?
Attack on DBMS
36
What is the default admin account created during a COMPOSE install?
Compinstaller
37
What determines the service configuration for a computer is controlled by the role the machine will serve on the network?
Core Services Installation stage of install
38
What are the 4 modules of COMPOSE?
Baseline Configuration Module (BCM) Domain Configuration Module (DCM) Core Services Installation Module (CSIM) Security Configuration Module (SCM)
39
What sets the policies for the built in IPSec Software?
IP Security Policy on Location Computer
40
What provides the ability to configure EFS, Bit Locker, and the built in cryptographic capabilities?
Public Key Policies
41
What are the 4 distributions of Linux?
RedHat Solaris HP UX IBM AIX
42
What are two ways to interact with Linux?
Command Line Interface (CLI) | Graphic User Interface (GUI)
43
Linux considers everything a what?
File
44
What is the file path from the root?
Absolute
45
What is the file path from present working directory or otherwise?
Relative
46
How do you find out what directory you are in?
Pwd | Present working directory
47
What is the format for a command?
48
What is the command for Top processes?
Top
49
What shows the top lines?
Head
50
What shows you the bottom lines?
Tail
51
What shows you all the files in a directory?
Ls | Lists all the files
52
What shows you the permission set details of all the files in a directory?
Ls -l Long list Ls -a Long list all
53
What command is a scripting tool and can be used for an advanced search?
-awk
54
What command changes ownership of a file?
Chown
55
What command modifies permissions of a file?
Chmod
56
What command searches for string following command?
Grep
57
Ownership
User and group sets
58
What are 4 digit octal codes?
SUID SGID
59
What ensures owner cannot delete file from other users?
Sticky bit
60
What identifies a file serial number?
Inode
61
What are two types of file serials?
Symbolize - name | Hard link - inode serial #
62
What is after the user to indicate shadow file in use?
X
63
What command changes the password?
Passwd
64
What command references services?
Daemon
65
What user id code does root have?
0
66
What command is start up and shut down?
Initid
67
Where are log files stored?
Var
68
What are the SIU findings priorties?
``` 5- routine action 4- undocumented 3- not found in the fleet 2- yellow 1- red remove immediately ```
69
Three sub caregories?
New Old Check version
70
What version of TLS for web servers?
TLS 1.0 or greater
71
What must be placed so the user knows what they are accessing?
Banner page
72
Two types of webpages?
Static Dynamic- accept and retrieve from the user
73
How did Linux start?
As personal computers
74
Where can linux configurations be found?
/etc
75
What is the /root
Home directory
76
What are two text editors?
Nano | Vi editor
77
Where can you find a linux password has expired?
Shadow file
78
Where can you start and stop running scripts or start up scripts?
Init.d
79
How do you make a directory?
mk dir
80
How do you remove?
Rm
81
How do you read text based files?
More | Cat
82
How do you search
Find
83
How do you see what is most cpu intensive?
TOP
84
What are files that list other files?
Directories
85
Where are common user shared files?
Bin
86
Where are start files kernel?
Boot
87
What are two ownership types?
User | Group
88
What is used to ensure programs operate within intended use?
Behavior
89
What is a unique hash?
Signature
90
What scans emails inspecting for viruses?
Auto Protect
91
What are 3 things about encryption?
Sensitivity Classification of network Need to know between the user and the data
92
Threats to webservers?
AV is out of date cross site scripting Instant messaging Lack of back up logs
93
What is sensitive non approved
Private webserver
94
What has no need to know
Public webserver
95
2 defaults
Disable services | Limit # of simultaneous requests from / to web server
96
Directory + file access controls?
Files directories
97
Certificates- approved must use
Private
98
Crl-
Crl checking using ocsp and crls
99
Auditing
Use attempted use, potential problems, tool | Auditing unusual conditions
100
Before web authors upload scan for viruses
Mobile code
101
Dmz
Specific is isolated
102
What are 4 ways to mitigate threats to web servers?
Permisive router filtering Intrustion detection Firewall protection Connections to internal hosts and support services