qs Flashcards
(17 cards)
What is a VLAN?
A virtual LAN (VLAN) is a logical overlay network that groups together a subset of devices that share a physical LAN, isolating the traffic for each group.
When providing access to Files and Folders across a local area network what security procedures can you implement on the objects?
You can set access controls by using Access Control Lists (ACLs) and also make the file/folder require 2FA.
What is bit-locker and what is it used for? What similar security can be put on thumb drives?
disk encryption feature built into windows that encrypts the entire drive, protecting data from unauthorised access. BitLocker to go is an extension of BitLocker that encrypts external drives.
You are setting up you new wireless router at home. What security can you implement on the device?
Change the default password, enable WPA3 encryption, disable WPS, hide the SSID, and enable the routers firewall
What is a hazard of using your email address to register on multiple random websites?
You can expose yourself to several hazards such as spam and phishing. data breaches, unwanted tracking and there is an increased risk of identity theft.
What steps can you take to best protect your windows computer from malicious attacks and malware? (not install ubuntu!!!)
Enable windows defender, keep software updated, use a firewall, enable controlled folder access, secure password (also enable 2FA), regular backups, be cautious with emails and links
Explain the three Internet Security zones
Internet Zone (low security) is for untrusted websites, allowing more functionality but with higher risk. The Local Intranet Zone (medium-high security) is for internal network resources, like intranet sites, with fewer restrictions but still some protections. The Trusted Sites Zone (high security) is for websites you explicitly trust, offering fewer security restrictions to allow full functionality.
Rogue users are logging on to your system. What Audit procedure should you carry out to check who is attempting to login?
Step 1 – Enable ‘Audit Logon Events’ Step 2 – Enable ‘Audit Account Logon Events’ Step 3 – Search Related Logon and Logoff Event Logs in Event Viewer.
What authentication protocols are used with 802.1x?
Extensible Authentication Protocol (EAP), which provides a secure method to send identifying information over-the-air for network authentication.
What is a dictionary attack?
type of brute force attack where hackers try to guess a user’s password to their online accounts by quickly running through a list of commonly used words, phrases, and number combinations.
What is social engineering?
social engineering takes advantage of human psychology to bypass technical defences and is often one of the most effective attack methods
Explain Confidentiality, Integrity and Availability
- Confidentiality refers to protecting sensitive information from being accessed by unauthorised individuals.
- integrity refers to ensuring that data remains accurate, consistent and unaltered by unauthorised individuals
- Availability ensures that data and systems are accessible and functional when needed by authorised users.
Explain three factor authentication
it is an advanced security process that requires users to provide three different types of information to verify their identity
What is a DMZ?
DMZ serves as a security buffer zone to protect internal systems from direct exposure to the internet while allowing necessary external access to certain services
What is the security problem with running multiple services on one server?
Lack of sufficient isolation between them, which increases the risk of one service impacting the security, performance or availability of others
- Explain a Public Key Infrastructure and its purpose