Securing Individual Systems Part 2 Flashcards

(57 cards)

1
Q

This is also known as media sanitation…

A

Data Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are monitors vulnerable?

A

They have USB slots that could be used to get into system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RATs

-Trojan that doesn’t do anything bad until someone tells it to remotely

A

Remote Access Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus that’s designed to make itself hard to find

A

Armored Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type of secure operating system?

  • Windows Server
  • built in funtionality
  • more connections
A

Server OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WPS

A

Press a button on your printer and then on your computer and you’re connected via WPA-2 encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of secure operating system?

-Desktop versions

A

Workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SED

-TPM built into drive

A

Self Encrypting Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EMI

A

Electromagnetic Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False

-Host-based firewalls are set up as implicit deny by default

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Rubber Ducky?

A

USB stick that you’re computer sees as a keyboard, but is actually a hacking tool that can run scripts and such

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Developer could write this into software for good or bad reasons

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Clearing

A

Can be done with commands such as erase, format, and delete - these methods are not final

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Type of secure operating system?

  • Apple
  • Android
A

Mobile OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDS

-Can help detect threats to the host

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Type of secure operating system?

  • limited functions
  • usually linux based
A

Kiosk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Programs that try to put ads up

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Clustering

A

More than one computer doing the same job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Bluetooth has how many classes?

A

Class 1 - 328’
Class 2 - 33’ distance (most popular for phone/headphones)
Class 3 - 3’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Used in smart phones and cars to ensure security on these embedded systems…

A

Secure Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Where can you disable ports?

A

In the bios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

FDE

A

Full Disk Encryption

24
Q

What does an ISCSI Initiator do?

A

Finds the SAN drives

25
HSM | -Handles all digital signatures - web servers are an example of who would use this
Hardware Security Module
26
Blue-Snarfing
Connecting to someones bluetooth without permission to steal data
27
IDS - Inside the network - Watches within the network traffic - Sends alerts on suspicious activity
Intrusion Detection Software
28
Purging
Will process the device to remove data from the drive - the device will no longer be usable Ex: magnet machine
29
DEP | -Keeps people from running code through system memory reserved locations
Data Execution Prevention
30
Piece of software that attaches to other files, propagates, and spreads to other devices, and then eventually activates
Virus
31
Software you don't want on your computer - it may or may not be bad
Malware
32
Malware that changes itself enough to confuse virus detection
Polymorphic Malware
33
Similar to RATs - are triggered by an event and not someone remotely
Logic Bomb
34
Some form of malware that sends your info back to the creator of it
Spyware
35
Blue-Jacking
Linking up to someones bluetooth without permission just to use resource
36
This is a built-in Windows tool to write and custom build scripts to automate tasks
PowerShell
37
Type of secure operating system? | -certified machines that are locked down as much as possible while keeping functionality
Trusted OS
38
What are removable media controls?
Not allowing people to use optical drives - can shut it off or put a policy on it
39
ACL that allows programs
White List
40
Software that's running on your system - could be software you're using but is also doing something bad in the background
Trojan
41
Scan results identify a file that may not actually harm a system or is actually allowed on the system
False Positive
42
Records keystrokes
Keylogger
43
Destroying
Will ruin the data and physical media - this includes paper, tape, electronic data, etc. Ex: Burning, shredding, pulping
44
ACL that denies programs
Black List
45
Type of secure operating system? | -appliance
Embedded System
46
Software that escalates privileges to execute other things on computer - could be good or bad
Rootkit
47
Application management / Desktop Management tools
Used to make sure everyone is running the correct version of things and all licenses are accounted for
48
IPS - Active IDS - Usually close to the edge of the network - Action to prevent will occur at the IPS device
Intrusion Prevention System
49
Hidden Wifi
Ex: they make sd cards wifi cards - you cna plug them into someones printer/security camera and now you've created a wifi hotspot on their network
50
SAN - Creates new local drives - not network drives - ISCSI is another name for this
Storage Area Networking
51
TPM | -Chip that holds encryption keys for that drive - usually activated at bios to be able to encrypt drive
Trusted Platform Module
52
NAS - File based sharing protocol - Runs over standard network ex: SMB share
Network Attached Storage
53
SFC - Is a file integrity tool - Checks windows core files
System File Checker
54
RFI
Radio Frequency Interference
55
What does a file integrity check do?
Verifies the file isn't corrupted and that the version and date match expectation
56
ESD
Electrostatic Discharge
57
Type of malware that locks up your system until you pay someone money
Ransomware/crypto-malware