Shared Flashcard Set

Details

Security+
HCC Online Class
130
Computer Science
Undergraduate 1
05/04/2011

Additional Computer Science Flashcards

 


 

Cards

Term
Security, or controlling access to networks and data, is performed to achieve what three goals?
Definition
Trojan horse
Term
Which of the following terms describes a person who has gained legitimate access to a computer or network by providing a valid username and password?
Definition
Authenticated user
Term
What is the most common method of authentication in computer networks?
Definition
Passwords
Term
The principle of least privilege requires that each user in a network be given what?
Definition
Only enough access to perform his or her job.
Term
Why are unique usernames important in maintaining and reviewing audit trails?
Definition
They establish individual accountability and nonrepudiation
Term
Which of the following is a characteristic of Mandatory Access Control (MAC)?
Definition
Access to files is based on security levels of data and users.
Term
What best describes Discretionary Access Control (DAC)?
Definition
The person who created a file is the file's owner and has full control over access to that file.
Term
You're a security designer planning Role-Based Access Control for an intranet where each user has his or her own workstation. The department in which a user works determines his or her job function. The departments are: Management, Production, Marketing, and Sales. Different departments need access to different printers, files, folders, and workstations. Which of the following are the roles you should define?
Definition
Management, production, marketing, and sales.
Term
While examining network protocols enabled on network interface cards on servers and clients throughout an organization, a security administrator finds that most have far more active protocols than seem necessary for the network. What, if anything, should the security administrator do to enhance security?
Definition
Check for dependencies, and then disable all unnecessary protocols on all computers.
Term
Why are social engineering attacks such a common and often successful way to gain unauthorized access to networks?
Definition
Lack of security awareness and education among network users.
Term
What do you call a program that appears to serve some useful function but actually does harm behind the scenes?
Definition
Trojan horse
Term
Using simple passwords like birthdays, pet names, and nicknames exposes users to which type of attack?
Definition
Dictionary attack
Term
Which type of attack does not attempt to gain unauthorized access to information but instead only thwarts the availability of a resource?
Definition
DoS
Term
What kind of attack exploits vulnerabilities in half-open connections during a TCP three-way handshake?
Definition
SYN flood
Term
Which type of attack takes over a legitimate TCP connection?
Definition
TCP session hijacking
Term
What must you purchase if you want to use S/MIME to secure Internet e-mail?
Definition
A digital certificate
Term
Which of the following allows a Web server to store connection information and information about users?
Definition
Cookie
Term
A user receives an e-mail warning of a virus going around with instructions to delete a specific file. What should the user do?
Definition
Report the message to a security administrator before taking any action.
Term
Which type of program would a hacker use to get sensitive information from clear text data sent by IM and FTP programs?
Definition
Packet sniffer
Term
Suppose you're the security administrator of an FTP server. You want employees to be able to access the site from home. But you want to prevent the general public from accessing the site. What should you do?
Definition
Disable anonymous access.
Term
What should security administrators do before implementing a wireless network?
Definition
Conduct a thorough site survey.
Term
LDAP organizes directories into trees. What do you call the start of each tree?
Definition
Root
Term
What technique does VPN (Virtual Private Networking) use to provide security over untrusted public networks?
Definition
Tunneling
Term
Which of the following is a VPN protocol that operates at the Network layer (layer 3) or the OSI Reference model?
Definition
IPSec
Term
Your company wants to offer some employees Telnet access to the company network. However, they want to make sure it's secure. Which protocol should you use to secure the Telnet connection?
Definition
SSH
Term
Many government agencies rely on AES (Advanced Encryption Standard) for symmetric encryption. What is the name of the encryption algorithm upon which AES is based?
Definition
Rijndael
Term
What should security administrators do before implementing a wireless network?
Definition
Conduct a thorough site survey.
Term
Which of the following is an asymmetric encryption algorithm?
Definition
RSA (Rivest Shamir Adelman).
Term
Which of these would best ensure data integrity?
Definition
A message digest
Term
Upon receiving a digitally signed document, what does the recipient use to verify the sender's signature?
Definition
The sender's public key.
Term
Experts agree that hashed passwords provide the best security in terms of confidentiality. But even hashed passwords are still vulnerable to which type of attacks?
Definition
Brute force, dictionary, and birthday.
Term
Which of the following items could be found in a digital certificate?
Definition
Certificate holder's public key.
Term
PGP (Pretty Good Privacy) is based on which trust model?
Definition
Mesh
Term
Which of these statements is true of the query results from a CRL?
Definition
The data returned by the query might be outdated.
Term
When a Web browser connects to a Web server that's secured with SSL, what does the server present to the browser?
Definition
A digital certificate
Term
What are the four primary components of ISAKMP (Internet Security Association Key Management Protocol)?
Definition
Peer authentication, security associations, threat management, and key creation/management.
Term
Peer authentication, security associations, threat management, and key creation/management.
Definition
Though a key-management protocol, ISAKMP is not directly related to PKI and doesn't involve Certificate Authorities.
Term
To access a workstation, a user inserts a smart card containing a public encryption key. Then she types a password or PIN. The workstation decrypts the password or PIN using its private key. If everything looks good, the user is logged on to the workstation. What security method did the workstation use to grant access?
Definition
Multifactor authentication
Term
Company executives are concerned about eavesdroppers picking up sensitive data from cables in unsecured areas of the building. Which type of cabling would you recommend for those areas?
Definition
Fiber-optic
Term
Which of the following storage media has the least storage capacity?
Definition
Smart cards
Term
Which type of firewall is able to detect and drop rogue packets that are not part of an established TCP connection?
Definition
Stateful inspection
Term
Which of the following devices provides a good defense against hostile packet sniffing?
Definition
Switch
Term
An organization wants to set up a network to conduct secure transactions with business partners. Which network topology should they use?
Definition
Extranet
Term
You need to restrict access to parts of an existing network without changing the network's current topology. You want to use a simple hardware-based solution that requires minimal administrative overhead. What would be the best way to achieve this goal?
Definition
Implement a VLAN (Virtual LAN) using Ethernet switches.
LAN)
Term
Which technology hides internal hosts from external networks and serves as a basic firewall by blocking traffic that didn't originate from inside the local network?
Definition
NAT (Network Address Translation)
Term
What type of intrusion detection system might automatically break a connection or shut down a server in response to an intrusion?
Definition
Active detection
Term
What's the first action a system administrator should take in response to suspected criminal activity?
Definition
Contact the incident response team
Term
What would be the most effective way to prevent hackers from finding open ports and services to exploit when they scan your system?
Definition
Uninstall or disable all unused services and protocols
Term
Which two techniques allow an attacker to fingerprint a computer's operating system?
Definition
Malicious port scanning, ICMP message quoting.
Term
Which type of scanner uses ICMP to map a network?
Definition
A ping scanner can scan a whole range of addresses, thereby providing a map to an entire network.
Term
What is the best way to harden a custom application that's developed in-house?
Definition
Make sure that security is given due consideration at each step in the development process
Term
What configuration change protects a DNS server from misdirected traffic caused by spoofing attacks?
Definition
Disallow zone transfers from untrusted networks

Zone transfers allow data from one DNS server to be copied to another automatically. Preventing unauthorized zone transfers will prevent spoofing.
Term
The security goal to protect data from unauthorized disclosure or access is called what?
Definition
Confidentiality.

Confidentiality is about keeping sensitive data from prying eyes (and hands!).
Term
What do you call a program that appears to perform some useful function while doing bad

things behind the scenes?
Definition
Trojan horse
Term
Providing false information about the source of a message or attack is a form of what?
Definition
IP spoofing involves forging the source IP address in a packet to hide the actual source of

that packet.
Term
Which access control method bases authorization on people's role within an organization?
Definition
RBAC (Role Based Access Control) .
Term
What is an attacker hoping to achieve by sending more data to a program or protocol

handler than that item was designed to handle?
Definition
Buffer overflow
A buffer overflow occurs when poorly designed software can't handle more data than it was

designed to manage.
Term
Which type of attack attempts to destroy availability by preventing a system from handling

normal, legitimate requests for data?
Definition
DoS (Denial of Service) attack.

DoS attacks don't attempt to steal data or gain unauthorized access. They just try to prevent

other people from gaining access to a system.
Term
What must an administrator do to minimize the attack surface that a network device

exposes?
Definition
Disable all unnecessary protocols on the device.

Minimizing the attack surface requires disabling all protocols except those required for the

device to function as needed within the local network.
Term
Minimizing the vulnerabilities of assets and resources is the goal of which security objective?
Definition
Integrity.

Data integrity is about minimizing vulnerabilities in data and networks.
Term
People who use a pet name, nickname, birthday, or other simple password are exposing

themselves to which type of attack?
Definition
Dictionary attack.

A Dictionary attack uses a dictionary of commonly used passwords to discover a specific

password.
Term
Intentionally altering the destination IP address that a name server provides during name

resolution is an example of which type of attack?
Definition
Spoofing attack.

Spoofing is the intentional forging of source and destination IP addresses to hide the true

source of an attack, or misdirect traffic.
Term
Giving every user just enough access to perform his or her job, and nothing more, is known

as what?
Definition
Principle of least privilege.

The principle of least privilege states that every user be given exactly as much access as

needed to perform a job, and nothing more.
Term
Which access control method is based on sensitivity labels and security clearances?
Definition
MAC (Mandatory Access Control).

MAC uses sensitivity labels and security clearances like Confidential, Secret, and Top Secret

to maximize data confidentiality and integrity.
Term
Which attack exploits the small buffers used in the TCP three-way handshake to hinder the

availability of data on a server?
Definition
SYN flood.

A SYN flood exploits vulnerabilities by using spoofed source IP addresses to leave half-open

connections on a server. That prevents the server from handling legitimate users who are

attempting to connect to the server.
Term
What do you call a file that keeps a record of successful logins, failed login attempts, file

activities, and the like?
Definition
Audit trail.

Audit trails keep track of who did what and when.
Term
Which is an example of biometric authentication?
Definition
Retinal scan.

Biometrics is based on biological features that are unique to each person, like fingerprints,

handprints, voice patterns, and blood vessels in the retina.
Term
Which authentication approach is used for Internet connections when a username and

password are not enough to provide proof of identity?
Definition
Multi-factor.

When biometrics isn't feasible, but passwords are not enough, multi-factor authentication

can be used to require two or more forms of authentication.
Term
Which type of attack sends an ICMP Echo Request with a malformed offset and improper

MTU (Maximum Transmission Unit) to intentionally crash a server?
Definition
Ping of Death.

An ICMP Echo Request is also known as a ping. Sending a bad one can overflow the

recipient's buffer and cause it to crash.
Term
What is an easy method that any user can employ to prevent virus infection from e-mail

attachments?
Definition
Install anti-virus software that scans incoming e-mail messages.

Many viruses spread through e-mail attachments. Virtually all anti-virus software scans

incoming e-mail for viruses and other malware.
Term
DAC (Discretionary Access Control) is inherently vulnerable to which kind of attack?
Definition
Trojan horse.

DAC has two weaknesses, 1) Lack of centralized administration and 2) no means of

preventing Trojan horses from doing evil deeds.
Term
What is the best way to protect a system from social engineering attacks?
Definition
Training and education.

Social engineering attacks are nontechnical. They rely on users' ignorance and tendency to

trust other people. Human training and awareness are really the only defense.
Term
Which access control method is based on the Bell-LaPadula model, which allows users to

read down, but not to write down?
Definition
MAC (Mandatory Access Control).
Term
Which access control model offers great granularity through the use of ACLs (Access Control

Lists)?
Definition
DAC (Discretionary Access Control) .

DAC (Discretionary Access Control) is best known for granular access control through ACLs at

each file and folder.
Term
What is the basic goal of system logging?
Definition
Keep a record of system usage.

The most basic and common use of system logging is simply to keep a record of system

usage.
Term
User Mary has Allow Read and Allow Write permissions to FileA through her membership in

the Accountants group. She has Deny Read permissions to FileA through her individual user

account. What is Mary's effective permission on FileA?
Definition
Mary has no access to FileA.
Term
Which is the preferred access control method in organization with

high turnover rates?
Definition
RBAC (Role Based Access Control) .

RBAC, which authorizes access based on people's roles, is the preferred access control

method in organizations with high employee turnover.
Term
A system administrator reports that upon deleting a terminated employee's files, other files

on the system started disappearing on their own. The system administrator has been

victimized by which type of malware?
Definition
Logic bomb.

Programs relating to employees that do bad things on schedule, or in response to some other

event, are usually Logic bombs.
Term
Why would a network administrator create complex ingress/egress filtering rules to drop

packets that don't contain certain source and destination IP addresses?
Definition
To prevent spoofing.

Ingress/egress filtering provides the best defense against spoofing attacks.
Term
Which type of attack exploits a TCP vulnerability that allows spoofed packets to be inserted

into a stream and executed like legitimate packets?
Definition
TCP Session Hijacking .

TCP Session hijacking swipes an Internet connection's session state by inserting spoofed

destination IP addresses into a stream to poison the ARP cache.
Term
What do Ping of Death, Smurf, Fraggle, Teardrop, Bonk, and Boink have in common?
Definition
They use buffer overflows to crash a server and deny service.
Term
Which type of DoS attack uses multiple computers to simultaneously send requests for pages

to a Web server?
Definition
DDoS (Distributed Denial of Service).

DDoS employs multiple zombie computers to send simultaneously and flood a server with

connection requests.
Term
Subseven, Masters Paradise, and NetBus are programs used to launch which type of attack?
Definition
Backdoor.

Some backdoor attacks exploit maintenance hooks in existing programs. Programs like those

mentioned in this question also provide a means of launching backdoor attacks.
Term
Users report that information transmitted across the network seems delayed, and in some

cases altered in transit. To which type of attack have these users likely fallen victim?
Definition
Man in the Middle.

The Man in the Middle is a computer or program that can capture and manipulate packets as

they cross a network
Term
Ensuring that a message sent across a network is not intercepted and altered in transit is an

example of what security goal?
Definition
Integrity.

Confidentiality is about preventing unauthorized disclosure. Ensuring that data is true,

accurate, and has not been falsified comes under data integrity
Term
While reviewing audit trails, an administrator notices that a regular user ran a program that requires administrative privileges. Which term describes what happened?
Definition
Privilege escalation
Term
Which type of physical access barrier was designed to prevent piggybacking?
Definition
Mantrap
A mantrap is a room that's specially designed to prevent piggybacking, where an unauthorized person gains access with the help of an authorized person.
Term
Which of the following technologies supports high availability?
Definition
RAID.

Correct! RAID (Redundant Array of Independent Drives) stores data on multiple hard drives to provide high availability.
Term
Documenting change levels and revision information is especially important for which of the following?
Definition
Disaster recovery
Term
Which would be the best source of information regarding the Annualized Rate of Occurrence (ARO) for a risk?
Definition
An insurance company
Insurance companies thrive on risk analysis and would therefore be your best bet for finding the annualized rate of occurrence for a risk.
Term
Which of the following best describes the concept of due care?
Definition
Policies and procedures designed to minimize damage or injury.
Term
When recovering from a disaster, which processes should be reinstated first?
Definition
The least critical processes.
Term
Crime scene technicians and investigators keep a log of everything that happens to a piece of evidence from the moment it is discovered. What is this log called?
Definition
Chain of custody.
The chain of custody details everything that happens to a piece of evidence from the time it's found to its presentation in court.
Term
When is a privileged user account most vulnerable to misuse?
Definition
When the account holder's
Term
When is a privileged user account most vulnerable to misuse?
Definition
When the account holder's employment is terminated.
Term
Management gives an employee a laptop to use away from the office. While using it, the employee erases some critical files that render the laptop useless. What steps should have been taken to avoid this problem?
Definition
The user should have been trained how to use the laptop.
Term
The protection of data against unauthorized access or disclosure is an example of what?
Definition
Confidentiality.
Term
Which of the following accurately describes the concept of data integrity?
Definition
A means of minimizing vulnerabilities of assets and resources.
Term
An online retailer's business model consists of three departments: Inventory, Order Processing, and Shipping. People in the Inventory department need Read/Write access to Inventory data and Read access to Orders data. People in Order Processing need Read/Write access to Orders data and Read access to Inventory data. People in Shipping need Read access to Orders and Inventory data. There is a high rate of turnover in all departments. Which access control model would work best for this business?
Definition
RBAC (Role-Based Access Control).
Term
A disgruntled customer calls the Customer Support department of an online business, demanding that his password be changed because the system will not accept the password he originally entered. To keep the customer happy, the operator changes the password as per the customer's request. Some weeks later, the actual customer calls to complain of fraudulent purchases made on her account and sent to an unknown address. What type of intrusion has the Customer Support department been victimized by?
Definition
Social engineering
Term
A network administrator reports that upon deleting some records from a terminated employee, other files suddenly started to disappear on their own. Which type of malicious code is most likely the cause of this problem?
Definition
Logic bomb
Term
To hide the true source of an attack or gain unauthorized access to a system, an attacker spoofs which field in a packet?
Definition
Source IP address
Term
A Web server becomes overwhelmed by thousands of legitimate requests for a Web page, apparently all coming from different computers at the same time. This Web server is most likely under which type of attack?
Definition
A DDoS attack creates agents on hundreds or thousands of unsuspecting computers called zombies. A handler then triggers the zombies to request a Web page all at the same time.
Term
Which two encryption key lengths does SSL/TLS support?
Definition
40-bit and 128-bit
Term
What is the most common source of attack against CGI scripts?
Definition
User data typed into forms.
Attackers can cause buffer overflows and security breaches from the HTML forms that CGI relies on.
Term
What must an e-mail relay server administrator do to prevent spam from being forwarded to a primary mail server?
Definition
Remove * from the list of trusted domains.
Term
Which technology can make wireless network security equivalent to a wired network's security?
Definition
WEP (Wired Equivalence Privacy) makes wireless networks as secure as wired networks.
Term
Which specification brings an object-oriented information model to LDAP directories and SNMP data?
Definition
DEN improves upon LDAP and SNMP by making their data more accessible to modern object-oriented programming languages.
Term
Which of the following protocols lets you create a Virtual Private Network (VPN) between a corporate network and a remote office?
Definition
IPSec
Term
In symmetric encryption, how many security keys are needed to encrypt and decrypt files?
Definition
Symmetric encryption uses a single private key for encryption and decryption.
Term
What is the primary advantage of asymmetric encryption?
Definition
It allows encryption and decryption without the sharing of private keys.
Term
What is the primary advantage of asymmetric encryption?
Definition
It allows encryption and decryption without the sharing of private keys.
Term
To apply for a digital certificate, a subject must submit proof of identity and what else?
Definition
A public key.
Term
X.509 requires CAs to provide data structure that lists certificates that have been revoked before their expiration date. What is the name of that data structure?
Definition
Certificate Revocation List
Term
Web browsers contain a trust list of trusted root CAs. Which technical term below refers to that internal trust list?
Definition
Embedded root certificates
Term
What should be your first step in implementing a company firewall?
Definition
Create a firewall policy.
Term
What network device lets you confine sensitive data to specific workstations using Access Control Lists and routing tables?
Definition
Router
Term
Using ingress filtering on a perimeter router to block packets with local network IP addresses protects against which type
Definition
IP spoofing
Term
What do you call an area of a network that's designed to provide services to the general public?
Definition
DMZ (demilitarized zone).
Term
Security administrators notice unusual activity that appears to be a series of attack attempts. What type of system should the administrators install to collect information about the attacker's identity, access, and attack methods?
Definition
Honeypot.
Term
Which IDS method provides information about potential threats but takes no action against those threats?
Definition
Passive detection.
Term
In Microsoft Windows, what security advantage does NTFS offer over the original FAT file system?
Definition
Granular control over file and folder permissions through ACLs.
Term
Which tool would be most effective in helping a security administrator find security holes in a network?
Definition
Vulnerability scanner
Term
What's the best way to protect a DNS server from DoS attacks?
Definition
Disable all applications except DNS on the primary DNS server
Term
Which of the following should be included in a fire protection plan for a fireproof computer room?
Definition
Emergency shutdown procedures.
Even a fireproof computer room will get hot from nearby fire, so it's best to shut the computers down until things cool off.
Term
In a decentralized privilege management structure, where are user accounts and passwords stored?
Definition
On each individual server
Term
Extreme fluctuations in room temperature can cause which problem?
Definition
Chip Creep
Term
A need to know policy is based on which security principle?
Definition
Least privilege
Term
What is the first step to developing a disaster recovery plan (DRP)?
Definition
Get policymakers to agree on the plan objectives.
Term
What is the most overlooked element of security management?
Definition
Security awareness
Supporting users have an ad free experience!