Security Flashcards

1
Q

A firewall operating as a ____ passes or blocks traffic to specific addresses based on the type of application and the port used.

A

packet filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ___ firewall can be thought of as an intermediary between your network and any other network.

A

proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ firewalls are used to process requests from an outside network; the ____ firewall examines the data and makes rule-based decisions about whether the request should be forwarded or refused.

A

Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A proxy firewall typically uses two ____.

A

network interface cards (NICs).
*Note
This type of firewall is referred to as a dual-homed firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ proxy functions read the individual commands of the protocols that are being served.

A

Application-level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An implementation of this type of proxy must know the difference between ___ and ___ operations, for example, and have rules specifying how to execute them.

A

Get & Put

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ____ proxy creates a circuit between the client and the server and doesn’t deal with the contents of the packets that are being processed.

A

circuit-level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Many proxy servers also provide full ____, and other usage information that wouldn’t normally be kept by a circuit-level proxy server.

A

full auditing, accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ inspection is also referred to as ____ packet filtering.

A

Stateful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ describe how the employees in an organization can use company systems and resources, both software and hardware.

A

Acceptable use policies (AUPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ____ attack is an attempt to guess passwords until a successful guess occurs.

A

brute-force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A ____ attack uses a dictionary of common words to attempt to find the user’s password.

A

dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ___ attack typically uses a combination of dictionary entries and brute force.

A

hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ are software programs that have the ability to hide certain things from the operating system; they do so by obtaining (and retaining) administrative-level access.

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ virus exploits the enhancements made to many application programs.

A

macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____virus attaches itself to legitimate programs and then creates a program with a different filename extension.

A

companion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ____ attack is an attempt by someone or something to masquerade as someone else.

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Rather than self-replicating, like viruses and worms, ___ is spread to machines by users who inadvertently ask for it.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An ____ virus is designed to make itself difficult to detect or analyze. ____ viruses cover themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus.

A

armored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A ____ virus attaches itself to legitimate programs and then creates a program with a different filename extension.

A

companion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A ____ virus exploits the enhancements made to many application programs.

A

macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

____ viruses can infect all of the documents on your system and spread to other systems via email or other methods. Macro viruses are one of the fastest-growing forms of exploitation today.

A

Macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A ___ virus attacks your system in multiple ways.

A

multipartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A ___ virus alters programs and databases and the only way to remove this virus is to reinstall the programs that are infected.

A

phage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A ____ is an algorithm or other element of a virus that uniquely identifies it.

A

signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A ____ virus attempts to avoid detection by masking itself from applications.

A

stealth

27
Q

With a ____ virus an infected file may report a file size different from what is actually present.

A

stealth

28
Q

____ are programs that enter a system or network under the guise of another program.

A

Trojan horses

29
Q

With ____, software—often delivered through a Trojan horse—takes control of a system and demands that a third party be paid.

A

ransomware

30
Q

With ____ spoofing (also known as ___ poisoning), the media access control (MAC) address of the data is faked.

A

ARP

31
Q

With ___ spoofing, the ___ server is given information about a name server that it thinks is legitimate when it isn’t.

A

DNS

32
Q

This type of spoofing can send users to a website other than the one to which they wanted to go, reroute mail, or do any other type of redirection for which data from a DNS server is used to determine a destination.

A

DNS

33
Q

Software running on infected computers called zombies is often known as a ___.

A

botnet

34
Q

Given a security-related scenario, ____ can take into account such settings as restricting user permissions, setting login time restrictions, disabling the guest account, locking an account after a certain number of failed attempts, and configuring a screen lock when the system times out after a certain length of inactivity.

A

account management

35
Q

____ systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed.

A

Data loss prevention (DLP)

36
Q

One of the best-known DLP systems is ___

A

MYDLP

37
Q

Microsoft wanted to create a group in Windows that was not as powerful as the Administrators group, and that is how the ___ group came into being.

A

Power Users

38
Q

____ would be given read/write permission to the system, allowing members to install most software but keeping them from changing key operating system files.

A

Power users
*Note
The group did not work out as planned, and in Windows Vista, Windows 7, and Windows 8/8.1, the group has no more permissions than a standard user. The group is now only kept around for backward compatibility with Windows XP systems.

39
Q

Before Windows NT was released, it had become apparent to Microsoft that a new file system was needed to handle growing disk sizes, security concerns, and the need for more stability. ___ was created to address those issues.

A

NTFS

40
Q

One of the benefits of NTFS was a ____ system, which made it possible for Windows NT to back out of any disk operations that were in progress when it crashed or lost power.

A

transaction tracking

41
Q

With NTFS, files, directories, and volumes, each can have their own ___.

A

security

42
Q

It’s possible to convert from ___ to NTFS without losing data, but you can’t do the operation in reverse

A

FAT32

43
Q

If you’re using FAT32 and want to change to NTFS, the convert utility will allow you to do so. For example, to change the E: drive to NTFS, the command is convert

A

e: /FS:NTFS

44
Q

What NTFS permission gives the user all of the other choices and the ability to change permissions. The user can also take ownership of the directory or any of its contents?

A

Full Control

45
Q

What NTFS permission Combines the Read & Execute permission with the Write permission and further allows the user to delete everything, including the folder?

A

Modify

46
Q

What NTFS permission combines the permissions of Read with those of List Folder Contents and adds the ability to run executables?

A

Read & Execute

47
Q

What NTFS permission allows the user to navigate the entire directory structure, view the contents of the directory, view the contents of any files in the directory, and see ownership and attributes?

A

Read

48
Q

What NTFS permission allows the user to create new entities within the folder.

A

Write

49
Q

____ allows for encryption/decryption of files stored in NTFS volumes.

A

Encrypting File System (EFS)

50
Q

A ___ format (typically only accomplished in the factory) can be performed on the system, or a utility can be used to completely wipe the disk clean.

A

low-level

51
Q

Never perform a low-level format on ___ or ___ drives! They’re formatted at the factory, and you may cause problems by using low-level utilities on these types of drives.

A

IDE or SCSI

52
Q

____ the drive entails copying over the data with new data.

A

Overwriting

53
Q

____ involves applying a strong magnetic field to initialize the media (this is also referred to as disk wiping).

A

Degaussing

54
Q

A ___ is different from a virus in that it can reproduce itself, it’s self-contained, and it doesn’t need a host application to be transported.

A

worm

55
Q

____ is an attempt to steal a valid IP address and use it to gain authorization or information from a network.

A

TCP/IP hijacking

56
Q

A attack attempts to replay the results of a previously successful session to gain access.

A

replay

57
Q

A exploitation attack attempts to exploit weaknesses in software.

A

software
*Note
A common attack attempts to communicate with an established port to gain unauthorized access.

58
Q

Your computer is infected with a virus that can change signature each time it is executed. What type of virus is it?

A

Polymorphic

59
Q

What term refers to an antivirus software file updated from time to time to protect a computer from new viruses?

A

Definition

60
Q

Which of the following commands will show the MAC address on a Windows-based PC?

A

ipconfig /all

61
Q

Rootkits are programs that infiltrate the operating system in order to gain administrator-level access. Rootkits are notoriously difficult to detect and remove. Sometimes reinstalling the operating system is the only way to recover from a rootkit infection. Rootkits have the following features:

A

They allow an attacker to run packet sniffers secretly to capture passwords.

They allow an attacker to set a Trojan into the operating system and thus open a backdoor for anytime access.

They allow an attacker to replace utility programs that can be used to detect the attacker’s activity.

They provide utilities for installing Trojans with the same attributes as legitimate programs.

62
Q

___ is used to collect personal information stored in the computer and send it to a third party without the permission of the user.

A

Spyware

63
Q

What category of malware do pop-up advertisements fall beneath?

A

Adware