Week 4 Flashcards

1
Q

What are the four core SRGs?

A
  • Application
  • Network Infrastructure
  • OS
  • Policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Command to exit and save modifications

A

:wq!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Command that stores configurations for system bootup

A

Inittab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 management groups of PAM

A
  • account
  • authentication
  • password
  • session
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a directory?

A

File containing files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the command “top” do?

A

Views top running processes on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the command “tail” do?

A

View last portion on a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the command “more” do?

A

Read text based files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the command “mkdir” do?

A

Creates new directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does “x” mean?

A

Shadow file being used or encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a false positive?

A

File or program that may exhibit behavior or coding that triggers a behavior alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an algorithm or hash that is specific to a unique attack/virus?

A

Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which feature will prevent unwanted changes to a computer by restricting access to ports, files, and shares?

A

Access protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is privilege escalation?

A

Someone having more access than they are authorized to have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you not use admin accounts for?

A
  • social networking
  • email
  • web browsing
  • personal stuff
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many accounts will an admin have at a minimum?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What kind of Trojan uses a jumping point to get to other systems?

A

Proxy Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of Trojan causes havoc by deleting files, corrupting the OS, and crashing the whole system?

A

Destructive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of Trojan provides full or partial access to a victim’s system?

A

Remote access Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of trojan sends data such as cookies, key strokes, and passwords to attacker via email or backdoor?

A

Data sending Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the signs of a DoS?

A
  • slow network performance
  • unavailability of a particular website
  • dramatic increase of email spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ways to prevent session hijacking

A
  • encryption (SSH,SSL)
  • reducing amount of openings in network
  • using secure protocol
  • strong authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What do you use to configure security policies for Windows?

A

GPO Editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What command do you use to edit GPOs?

A

gpedit.msc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What snap in allows admin to edit local security templates for the system?

A

Security templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What snap in allows admin to analyze system configuration and applied security templates?

A

Security configuration and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What snap in allows admin to configure built in IPSec software on windows systems for encrypted communications?

A

IP security policy management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which snap in provides configuration of RBAC setting for installed applications?

A

Authorization Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

GPO Editor separates the local computer policies into?

A
  • user configuration

- computer configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which policy provides options for setting password complexity, lockout accounts, and length requirements?

A

Account polices

31
Q

What does public key policy do?

A
  • ability configure EFS
  • BitLocker
  • built in crypto capabilities
32
Q

Which policy provides options for system auditing, right setting, and security features such as network access?

A

Local policies

33
Q

The determination of service configuration for a computer is controlled by role and will be done during _______ stage of installation?

A

CSIM

34
Q

If the database is corrupted, what could happen?

A
  • loss of privacy
  • corruption of data
  • denial of service
  • breach of National Security
35
Q

What are he 4 core SRGs?

A
  • applications
  • network infrastructure
  • operating systems
  • policy
36
Q

What are some password complexities?

A
  • numeric
  • upper and lower
  • password reuse
  • special characters
37
Q

DBMS must use what?

A

NIST validates FIPS 140-2

38
Q

How can DoS attacks be mitigated?

A
  • number of connections by a single user

- database clustering

39
Q

What is a SQL Injection?

A

Attack which malicious code is inserted into string and passed to SQL server for execution

40
Q

What are the LINUX distributions?

A
  • Red Hat
  • Solarias
  • HP-UNIX
  • IBM-AIX
41
Q

Head

A

view topmost lines of a file

41
Q

More

A

Used to read/view contents of file

41
Q

When entering command in, what is the certain way?

A

Command> options > parameters

41
Q

What are the two text editors?

A
  • vi

- nano

41
Q

How to save changes for vi?

A

:wq!

41
Q

How to save changes for nano?

A

CTRL + O

41
Q

If making changes to a file in /etc directory, what should level of access should I be in?

A

Root

41
Q

What directory contains startup files and the kernel?

A

Boot directory

41
Q

What directory contains most system config files?

A

/etc

42
Q

What directory contains references to all CPU peripheral hardware?

A

Dev

43
Q

What is /root?

A

Home directory for root user account

44
Q

What is / ?

A

Root directory

45
Q

What do inodes do?

A

Type of serial number hat contains information about actual data that makes up the data (who owns its, file size)

46
Q

Two types of links

A
  • symbolic

- hard

47
Q

Which link links files by their name?

A

Symbolic

48
Q

Hard links point to file by inode number, hard link file must exist on he same file system

A

N/A

49
Q

What configuration file contains configuration settings for any authentication modules used by he system?

A

Pam.d

50
Q

What are the two main ownership sets?

A
  • user

- group

51
Q

What does stickybit do?

A

Protects public directories by preventing users from deleting files that belong to other users

52
Q

What does setgid do?

A

User gains privileges of file executed

53
Q

LINUX uses a 4 digit octal permission set

A

N/A

54
Q

What does umask do for LINUX?

A

A kernel variable that controls the file access permissions assigned to newly created files and directories

55
Q

Where would you go to view password in encrypted form?

A

/etc/shadow file

56
Q

What command allows user to change password?

A

Passwd

57
Q

What do TCP wrappers do?

A

Host based networking ACL system

58
Q

PAM is separated into 4 groups.

Which one checks that the specified account is a valid authentication target under current conditions?

A

Account modules

59
Q

Which PAM group defines actions that occur at the beginning and end of sessions?

A

Session

60
Q

Which PAM group verifies user identity by checking password?

A

Authentication

61
Q

Which directory contains start and stop scripts for all directories running in the system?

A

Init.d

62
Q

What threats are unique to web servers?

A
  • non-existent anti-virus
  • instant messaging
  • default OS and web server installs and misconfigurations
  • cross-site scripting
  • remote data services in Microsoft IIS
63
Q

Encryption requirements for data transmission are dependent on?

A
  • sensitivity of data being transmitted
  • classification level of the network being traversed
  • differences in need-to-know between the data and the user
64
Q

What are additional security controls to have in place with the web server host?

A
  • disabling unnecessary services

- limiting number of simultaneous requests

65
Q

How many types of web pages and what do they do?

A
  • static: no user interaction

- dynamic: specialized content for users and generated webpages