Part 4 Flashcards

1
Q

When an antivirus program detects a virus an option may be given to an administrator to remove, clean or ____ a file.

A

Quarentine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There are occasions when a file or program may exhibit behavior or coding that triggers a signature or behavior alert from an antimalware system often called?

A

False Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An algorithm or hash that is unique to a specific attack method or virus?

A

Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What scans continuously inspect files and email data for viruses as they are read from or written to a computer?

A

Auto Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the effectiveness of VSE depend on?

A

Scanning engine and definition DAT files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What prevents unwanted changes to your computer by retricting access to specified ports, files, shares etc?

A

Access Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How often on COMPOSE do Anti Virus scans run?

A

Daily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is real time monitoring for malicious activities?

A

Behavioral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a program that attaches itself to a file or another program?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a program that replicates and propogates itself without having to attach itself to a file or program.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three reasons privilage escalation can occur?

A
  • Error by administrator
  • weak password policy
  • bad coding in software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are additional security settings required?

A
  • Account lockout duration
  • minimum password length
  • disabling unnecessary services
  • “Allow administration by” option
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 4 types of Trojans?

A

Remote Access Trojan (RAT) : full or partial access to victim’s system

Data Sending : sends key strokes, passwords, cookies via email or back door

Destructive : deleting files, corrupting the OS, crashing the system, disable AV on the firewall

Proxy : jumping point for an attacker on another system to mask identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of Denial of Service attack?

A

Deny legitimate users from accessing infomation or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some signs of Denial of Service attack?

A
  • Spam
  • Unavailable website

“Flood”, slowing or stopping data transfer, consumption of disk space or processor time, disrupting routing info, disrupting physical network components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What involves exploiting the session between devices?

A

Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can you prevent session hijacking?

A
  • Use encryption
  • use secure protocol
  • limit incoming connections
  • minimize remote access
  • strong authentication
  • using switches over hubs
  • user training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How many user accounts should an admin have at minimum?

A

2

User and administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What command line run script launches GPO editor?

A

gpedit.msc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What provides the configuration setting of RBAC settings for installed applications?

A

Authorization Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What analyizes system configuration and applies security templates?

A

Security Configuration and Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

On a windows system, GPO editor seperates the local computer policy into two sections?

A
  • Computer configuration

- User configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What provides the options for setting system auditing, rights assigned to groups, and their users and security features such as device settings, log on requirements, account settings, network access etc?

A

Local Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What provides options for setting password complexity and length requirements as well as account lockout lengths and attempt frequencies?

A

Account Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Database cryptography must be compliant against what for authentication of DBMS?

A

FIPS 140-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How can you protect databases from Denial of Service attacks?

A
  • Limit the number of connections

- Database clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What should be implemented to limit exposure?

A

Role Based Access Control Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are password complexity requirements?

A
  • minimum length
  • # of upper and lower case letters
  • # of numeric characters
  • # of special characters
  • password history or reuse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How long can an account be inactive before it should be disabled?

A

35 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What kind of permissions should a bind account have?

A

Full administrative access to the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What type of account is used to connect an application to its database?

A

Bind account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Where do databases fall under?

A

Application Core SRG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the 4 core SRGs?

A
  • Application
  • network infrastructure
  • operating system
  • policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are collections of requirements applicable to a given technology family?

A

SRG- Security Requirement Guides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What could result in the loss of privacy, corruption of data, breach national security?

A

Attack on DBMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the default admin account created during a COMPOSE install?

A

Compinstaller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What determines the service configuration for a computer is controlled by the role the machine will serve on the network?

A

Core Services Installation stage of install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the 4 modules of COMPOSE?

A

Baseline Configuration Module (BCM)
Domain Configuration Module (DCM)
Core Services Installation Module (CSIM)
Security Configuration Module (SCM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What sets the policies for the built in IPSec Software?

A

IP Security Policy on Location Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What provides the ability to configure EFS, Bit Locker, and the built in cryptographic capabilities?

A

Public Key Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the 4 distributions of Linux?

A

RedHat
Solaris
HP UX
IBM AIX

42
Q

What are two ways to interact with Linux?

A

Command Line Interface (CLI)

Graphic User Interface (GUI)

43
Q

Linux considers everything a what?

A

File

44
Q

What is the file path from the root?

A

Absolute

45
Q

What is the file path from present working directory or otherwise?

A

Relative

46
Q

How do you find out what directory you are in?

A

Pwd

Present working directory

47
Q

What is the format for a command?

A
48
Q

What is the command for Top processes?

A

Top

49
Q

What shows the top lines?

A

Head

50
Q

What shows you the bottom lines?

A

Tail

51
Q

What shows you all the files in a directory?

A

Ls

Lists all the files

52
Q

What shows you the permission set details of all the files in a directory?

A

Ls -l

Long list

Ls -a

Long list all

53
Q

What command is a scripting tool and can be used for an advanced search?

A

-awk

54
Q

What command changes ownership of a file?

A

Chown

55
Q

What command modifies permissions of a file?

A

Chmod

56
Q

What command searches for string following command?

A

Grep

57
Q

Ownership

A

User and group sets

58
Q

What are 4 digit octal codes?

A

SUID SGID

59
Q

What ensures owner cannot delete file from other users?

A

Sticky bit

60
Q

What identifies a file serial number?

A

Inode

61
Q

What are two types of file serials?

A

Symbolize - name

Hard link - inode serial #

62
Q

What is after the user to indicate shadow file in use?

A

X

63
Q

What command changes the password?

A

Passwd

64
Q

What command references services?

A

Daemon

65
Q

What user id code does root have?

A

0

66
Q

What command is start up and shut down?

A

Initid

67
Q

Where are log files stored?

A

Var

68
Q

What are the SIU findings priorties?

A
5- routine action
4- undocumented 
3- not found in the fleet
2- yellow
1- red remove immediately
69
Q

Three sub caregories?

A

New
Old
Check version

70
Q

What version of TLS for web servers?

A

TLS 1.0 or greater

71
Q

What must be placed so the user knows what they are accessing?

A

Banner page

72
Q

Two types of webpages?

A

Static

Dynamic- accept and retrieve from the user

73
Q

How did Linux start?

A

As personal computers

74
Q

Where can linux configurations be found?

A

/etc

75
Q

What is the /root

A

Home directory

76
Q

What are two text editors?

A

Nano

Vi editor

77
Q

Where can you find a linux password has expired?

A

Shadow file

78
Q

Where can you start and stop running scripts or start up scripts?

A

Init.d

79
Q

How do you make a directory?

A

mk dir

80
Q

How do you remove?

A

Rm

81
Q

How do you read text based files?

A

More

Cat

82
Q

How do you search

A

Find

83
Q

How do you see what is most cpu intensive?

A

TOP

84
Q

What are files that list other files?

A

Directories

85
Q

Where are common user shared files?

A

Bin

86
Q

Where are start files kernel?

A

Boot

87
Q

What are two ownership types?

A

User

Group

88
Q

What is used to ensure programs operate within intended use?

A

Behavior

89
Q

What is a unique hash?

A

Signature

90
Q

What scans emails inspecting for viruses?

A

Auto Protect

91
Q

What are 3 things about encryption?

A

Sensitivity
Classification of network
Need to know between the user and the data

92
Q

Threats to webservers?

A

AV is out of date
cross site scripting
Instant messaging
Lack of back up logs

93
Q

What is sensitive non approved

A

Private webserver

94
Q

What has no need to know

A

Public webserver

95
Q

2 defaults

A

Disable services

Limit # of simultaneous requests from / to web server

96
Q

Directory + file access controls?

A

Files directories

97
Q

Certificates- approved must use

A

Private

98
Q

Crl-

A

Crl checking using ocsp and crls

99
Q

Auditing

A

Use attempted use, potential problems, tool

Auditing unusual conditions

100
Q

Before web authors upload scan for viruses

A

Mobile code

101
Q

Dmz

A

Specific is isolated

102
Q

What are 4 ways to mitigate threats to web servers?

A

Permisive router filtering
Intrustion detection
Firewall protection
Connections to internal hosts and support services