Week 4 Flashcards

(73 cards)

1
Q

What are the four core SRGs?

A
  • Application
  • Network Infrastructure
  • OS
  • Policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Command to exit and save modifications

A

:wq!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Command that stores configurations for system bootup

A

Inittab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 management groups of PAM

A
  • account
  • authentication
  • password
  • session
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a directory?

A

File containing files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the command “top” do?

A

Views top running processes on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the command “tail” do?

A

View last portion on a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the command “more” do?

A

Read text based files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the command “mkdir” do?

A

Creates new directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does “x” mean?

A

Shadow file being used or encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a false positive?

A

File or program that may exhibit behavior or coding that triggers a behavior alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an algorithm or hash that is specific to a unique attack/virus?

A

Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which feature will prevent unwanted changes to a computer by restricting access to ports, files, and shares?

A

Access protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is privilege escalation?

A

Someone having more access than they are authorized to have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you not use admin accounts for?

A
  • social networking
  • email
  • web browsing
  • personal stuff
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many accounts will an admin have at a minimum?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What kind of Trojan uses a jumping point to get to other systems?

A

Proxy Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of Trojan causes havoc by deleting files, corrupting the OS, and crashing the whole system?

A

Destructive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of Trojan provides full or partial access to a victim’s system?

A

Remote access Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of trojan sends data such as cookies, key strokes, and passwords to attacker via email or backdoor?

A

Data sending Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the signs of a DoS?

A
  • slow network performance
  • unavailability of a particular website
  • dramatic increase of email spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ways to prevent session hijacking

A
  • encryption (SSH,SSL)
  • reducing amount of openings in network
  • using secure protocol
  • strong authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What do you use to configure security policies for Windows?

A

GPO Editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What command do you use to edit GPOs?

A

gpedit.msc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What snap in allows admin to edit local security templates for the system?
Security templates
26
What snap in allows admin to analyze system configuration and applied security templates?
Security configuration and analysis
27
What snap in allows admin to configure built in IPSec software on windows systems for encrypted communications?
IP security policy management
28
Which snap in provides configuration of RBAC setting for installed applications?
Authorization Manager
29
GPO Editor separates the local computer policies into?
- user configuration | - computer configuration
30
Which policy provides options for setting password complexity, lockout accounts, and length requirements?
Account polices
31
What does public key policy do?
- ability configure EFS - BitLocker - built in crypto capabilities
32
Which policy provides options for system auditing, right setting, and security features such as network access?
Local policies
33
The determination of service configuration for a computer is controlled by role and will be done during _______ stage of installation?
CSIM
34
If the database is corrupted, what could happen?
- loss of privacy - corruption of data - denial of service - breach of National Security
35
What are he 4 core SRGs?
- applications - network infrastructure - operating systems - policy
36
What are some password complexities?
- numeric - upper and lower - password reuse - special characters
37
DBMS must use what?
NIST validates FIPS 140-2
38
How can DoS attacks be mitigated?
- number of connections by a single user | - database clustering
39
What is a SQL Injection?
Attack which malicious code is inserted into string and passed to SQL server for execution
40
What are the LINUX distributions?
- Red Hat - Solarias - HP-UNIX - IBM-AIX
41
Head
view topmost lines of a file
41
More
Used to read/view contents of file
41
When entering command in, what is the certain way?
Command> options > parameters
41
What are the two text editors?
- vi | - nano
41
How to save changes for vi?
:wq!
41
How to save changes for nano?
CTRL + O
41
If making changes to a file in /etc directory, what should level of access should I be in?
Root
41
What directory contains startup files and the kernel?
Boot directory
41
What directory contains most system config files?
/etc
42
What directory contains references to all CPU peripheral hardware?
Dev
43
What is /root?
Home directory for root user account
44
What is / ?
Root directory
45
What do inodes do?
Type of serial number hat contains information about actual data that makes up the data (who owns its, file size)
46
Two types of links
- symbolic | - hard
47
Which link links files by their name?
Symbolic
48
Hard links point to file by inode number, hard link file must exist on he same file system
N/A
49
What configuration file contains configuration settings for any authentication modules used by he system?
Pam.d
50
What are the two main ownership sets?
- user | - group
51
What does stickybit do?
Protects public directories by preventing users from deleting files that belong to other users
52
What does setgid do?
User gains privileges of file executed
53
LINUX uses a 4 digit octal permission set
N/A
54
What does umask do for LINUX?
A kernel variable that controls the file access permissions assigned to newly created files and directories
55
Where would you go to view password in encrypted form?
/etc/shadow file
56
What command allows user to change password?
Passwd
57
What do TCP wrappers do?
Host based networking ACL system
58
PAM is separated into 4 groups. | Which one checks that the specified account is a valid authentication target under current conditions?
Account modules
59
Which PAM group defines actions that occur at the beginning and end of sessions?
Session
60
Which PAM group verifies user identity by checking password?
Authentication
61
Which directory contains start and stop scripts for all directories running in the system?
Init.d
62
What threats are unique to web servers?
- non-existent anti-virus - instant messaging - default OS and web server installs and misconfigurations - cross-site scripting - remote data services in Microsoft IIS
63
Encryption requirements for data transmission are dependent on?
- sensitivity of data being transmitted - classification level of the network being traversed - differences in need-to-know between the data and the user
64
What are additional security controls to have in place with the web server host?
- disabling unnecessary services | - limiting number of simultaneous requests
65
How many types of web pages and what do they do?
- static: no user interaction | - dynamic: specialized content for users and generated webpages