Section 21 Book Ch 27 Securing Computers Flashcards

1
Q

Man-in-the-middle attack

A

When a hacker is interceptting traffic between computer, servers etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Spoofing?

A

To impersonate another entity via email, accounts, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you fight against spoofing?

A

By providing certificates that prove you are who you are and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is (DOS) Denial of service?

A

When you flood a server with requests to the point that the server cant keep up and just gives out 404 codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is (DDOS) Distributed denial of Service?

A

When a massive group of computers controlled by a server somewhere and are commanded to send requests to server to have it shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Zero Day

A

A new kind of attack that have never been seen before

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

symptoms of a hacker in your computer

A

Renamed system files , Disappearing files , Lack of access,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name types of Perimeter security

A

Security guards, Mantrap, Locking doors,

entry control roster, badge reader, smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a hash?

A

A 1 way value , fixed length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are passwords saved and then retrieved

A

They are saved by hash values which are retrieved when you enter a password and then compared to the hash of what you have entered as the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is brute forcing?

A

trying to figure out a passwrod by guessing with multiple types of passwords until success

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a dictionary attack?

A

A list of known types of passwords used to crack password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Rainbow tables?

A

Like a dictionary attack but with tables of words, numbers, and symbols that come together to figure password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name password best practices?

A
Set strong passwords 
Long passwords - phrases 
Password expiration
Screen saver 
Lockscreen password 
Bios passwords
Multi-factor authentification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a worm?

A

First gen of malware that used networks to replicate themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a trojan?

A

Any malware that misleads users of its true intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Rootkit?

A

A type of program that seats itself inside the boot program drives and hides itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Ransomware?

A

A type of malware that threatens to publish data, lock out users unless money is given in exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Ransomware?

A

A type of malware that threatens to publish data, lock out users unless money is given in exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a botnet?

A

A bunch of zomie computers under the control of another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a botnet?

A

A bunch of zomie computers under the control of another

20
Q

What is a keylogger?

A

Records keystrokes

21
Q

What is spyware?

A

A piece of malware that spies on you

22
Q

What are signs of malware?

A
pop-ups
Browser redirection
Security alerts 
App crashes 
OS update failure 
Spam 
Hi-jacked email 
Automated replies 
Invalid certs(Trusted ROOT CA)
22
What are signs of malware?
``` pop-ups Browser redirection Security alerts App crashes OS update failure Spam Hi-jacked email Automated replies Invalid certs(Trusted ROOT CA) ```
23
There is no such thing as anit-virus just anti-malware
True
24
What is a recovery console?
Anit-malware tools
25
When you have malware on your computer what should you do?
Boot from a backup that is a known good
26
To protect against malware what should you do with the dns?
Secure your dns
27
What can you do with DNS to protect against malware
Encrypt your DNS
28
What is the first step in fighting malware?
Identify and research malware symptoms
29
What is the second step in fighting malware?
Quarantine the infected systems
30
What is the third step in fighting malware?
Disable system restore - Windows
31
What is the fourth step in fighting malware?
Remediate the infected systems | update the anti-malware files
32
What is the fifth step in fighting malware?
Scan and remove techniques with anti-malware
33
What is the sixth step in fighting malware?
Schedule Scans
34
What is the Sixth part 2 step in fighting malware?
Enable system restore and make a system restore point and delete old system retore
35
What is the seventh step in fighting malware?
Educate your users about mal-ware
36
What is Phishing?
Fake emails trying to gain info from you
37
What is spear phishing?
Emails tailored to a certain individual for hacking
38
First step of incident response
Know your responsibility
39
Second step of incident response
Identify the problem - Report through proper channels -Data/Device preservation - Use of documentation - Document changes
40
third step of incident response
Keep chain of custody - Tracking evidence - Document process
41
What is a End-User Licensing agreement (EULA)
Grants a person a license to use something Who the owner is How you can use the software
42
What is Digital Rights Management (DRM)?
Protects the different types of digital copyrights
43
What is the GNU General Personal License (GNU GPL)
Specifies that if you compile something you have to show the original code
44
What is a personal license?
Licenses for something that are given out on a per person basis
45
What is a enterprise license?
A software site license that is issued to a large company. It typically allows unlimited use of the program throughout the organization
46
What is Materials safety data sheet (MSDS)
How to handle enviornmetal products for disposal and stuff
47
For computers what are the best temp and humidity levels
Cold and dry
48
If vacuuming a computer what should you use?
Anti static vacuum