Chapter 9 Study Guide(miguelcoronel)x

ovenforksqueeΑσφάλεια

3 Νοε 2013 (πριν από 3 χρόνια και 7 μήνες)

66 εμφανίσεις

Chapter 9: Fundamental Security

Online Study Questions


Name: _
miguel coronel
_________ __________________________


9.1 Explain why security is important

1.

Who is affected by a lapse in security?

Everyone

2.

How can a network or computer be
harmed?

Theft, loss, network intrusion, and physical
damage

3.

What are the primary responsibilities of a
technician

Data and network security

Worksheet: Security Attacks

9.2 Describe Security Attacks

4.

What is a physical threat?

Events or attacks that
steal, damage, or
destroy equipment, such as servers,
switches, and wiring

5.

What is data threat?

Events or attacks that remove, corrupt,
deny access, allow access, or steal
information

6.

What is an internal threat?

Employees have access to data,
equipment,
and the network

7.

What is a malicious threat?

When an employee intends to cause
damage

8.

What is an external threat?

Users outside of an organization that do
not have authorized access to the network

9.

What is an unstructured threat?

Attackers use available resources, such as
passwords or scripts, to gain access and run
programs designed to vandalize

10.

What is an structured threat?

Attackers use code to access operating
systems and software

9.2.1 Define viruses, worms and Trojans

11.

What is a virus?

a program written with malicious intent
and sent out by attackers

12.

How are viruses transferred?

through e
-
mail, file transfers, and instant
messaging

13.

What is the most damaging type of virus?

keylog

14.

What is a stealth
virus?

infect a computer and lay dormant until
summoned by the attacker

15.

What is a worm?

a self
-
replicating program that is harmful
to networks

16.

Why is a worm harmful?

uses the network to duplicate its code to
the hosts on a network, often without
any
user intervention

17.

What is a Trojan?

technically a worm

18.

What is anti
-
virus software?

software designed specifically to detect,
disable, and remove viruses, worms, and
Trojans before they infect a computer

19.

How can the technician keep the
anti
-
virus
software up to date?

apply the most recent updates, patches,
and virus definitions as part of a regular
maintenance schedule

Worksheet: Third party Anti
-
Virus Software

9.2.2 Explain web security

20.

Why is web security important?

Because so
many people visit the World
Wide Web everyday

21.

What is ActiveX?

Technology created by Microsoft to control
interactivity on web pages

22.

What is Java?

Programming language that allows applets
to run within a web browser

23.

What are examples of
JavaScript?

Applets include a calculator or a counter

9.2.3 Define adware, spyware and grayware

24.

What is adware?

A software program that displays
advertising on your computer

25.

What is grayware?

A file or program other than a virus that is
potentially harmful

26.

What is phishing?

A form of social engineering where the
attacker pretends to represent a legitimate
outside organization

27.

What is spyware?

A file that sends information to the
organization responsible for launching the
spyware

Activity: Adware, Spyware, Phishing

9.2.4 Explain Denial of Service

28.

What is denial of service?

a form of attack that prevents users from
accessing normal services, such as e
-
mail
and a web server

29.

What are two common DoS attacks?

Ping of death
& E


mail bomb

30.

What is a zombie?

located at different geographical locations
make it difficult to trace the origin of the
attack


9.2.5 Describe spam and popup windows

31.

What is spam?

Junk mail, unsolicited e
-
mail. Used as a
method of advertising

32.

What are common indicators of spam?

No line subject, Incomplete return address,
Computer generated email,& Return email
not sent by the user

9.2.6 Explain social engineering

33.

What is a social engineer?

a person who is able to gain access to
equipment or a network by tricking people
into providing the necessary access
information

34.

How can you protect again social
engineers?

Never give out password, always ask for
the ID of unknown persons, restrict ac
cess
of unexpected visitors, escort all visitors,
never post password in your work area,
lock your computer when you leave your
desk, & do not let anyone follow you
through the door that requires and access
card

9.2.7 Explain TXP/IP attacks

35.

What is
a SYN flood?

Randomly opens TCP ports, tying up the
network equipment or computer with a
large amount of false requests, causing
sessions to be denied to others

36.

What is spoofing?

Gains access to resources on devices by
pretending to be a trusted
computer

37.

What is a man
-
in
-
the
-
middle attack?

Intercepts or inserts false information in
traffic between two hosts

38.

What is a Replay attack?

Uses network sniffers to extract usernames
and passwords to be used at a later date to
gain access

39.

Wha
t is DNS poisoning?

Changes the DNS records on a system to
point to false servers where the data is
recorded

9.2.8 Explain data wiping, hard drive destruction and recycling

40.

What is hardware destruction?

the process of removing sensitive data from
hardware and software before recycling or
discarding

41.

What are the three methods commonly
used to destroy or recycle data and hard
drives?

Data wiping, hard drive destruction, and
hard drive recycling

42.

What is data wiping?

a procedure performed to
permanently
delete data from a hard drive

43.

How can you fully ensure that data cannot
be recovered from a hard drive?

Use a third
-
party tool

9.3 Identify Security Procedures

44.

How often should security plans be
reviewed?

On a yearly basis

9.3.1
Explain what is required in a basic local security policy

45.

What questions should be covered in a
basic security policy?

1.

What assets require protection?

2.

What are the possible threats?

3.

What to do in the event of a
security breach?

46.

Who is responsible

for security

Every person within the company

47.

What are the recommended password
guidelines?

have a minimum length and include
uppercase and lowercase letters combined
with numbers and symbols

9.3.2 Explain the tasks required to protect physical equi
pment

48.

What is the Trusted Platform Module
(TPM)?

specialized chip installed on the
motherboard of a computer to be used for
hardware and software authentication

49.

How can you protect the access to your
facility?

Card keys that store user data,
including
level of access, Biometric sensors that
identify physical characteristics of the user,
such as fingerprints or retinas, Posted
security guard, & Sensors, such as RFID
tags, to monitor equipment

9.3.3 Describe ways to protect data

50.

What are
the two levels of password
protection that are recommended?

BIOS & Login

51.

What password will prevent the operating
system from booting?

BIOS

52.

What is a lockout rule?

Rules about password expiration and
lockout should be defined. Lockout rules
apply

when an unsuccessful attempt has
been made to access the system or when a
specific change has been detected in the
system configuration

53.

What is a VPN connection?

allows remote users to safely access
resources as if their computer is physically
attach
ed to the local network

54.

How does a VPN protect data?

uses encryption to protect data

55.

What is traffic?

Data being transported on a network

56.

What is a software firewall?

a program that runs on a computer to allow
or deny traffic between the
computer and
the network to which it is connected

57.

When should backups be made?

Monthly or weekly

58.

Where should backups be stored?

Offsite storage location for extra security

59.

What is a smart card?

a small plastic card, about the size of a
cre
dit card, with a small chip embedded in
it

60.

What is biometric security?

compares physical characteristics against
stored profiles to authenticate people

61.

What is a profile?

A profile is a data file containing known
characteristics of an individual
such as a
fingerprint or a handprint. In theory,
biometric security is more secure than
security measures such as passwords or
smart cards, because passwords can be
discovered and smart cards can be stolen

62.

Which file system offers journaling and
encry
ption capabilities?

NTFS

63.

What utility do you run to convert from
Fat32 to NTFS?

CONVERT

9.3.4 Describe wireless security techniques

64.

What are the basic security settings that
should be configured on a wireless router
Modified the default SSID, set up separate
or access point?

WLAN, use a strong password

65.

What is the SSID (service set identifier)?

The name of the wireless network

66.

What is the first generation security for
wireless?

Wired Equivalent Privacy(WEP)

67.

Which
wireless encryption supports robust
encryption provides government grade
security?

Wi
-
Fi Protected Access 2 (WPA2)

68.

Which wireless security protocol was
created by Cisco?

Lightweight Extensible Authentication
Protocol (LEAP)

69.

What is WTLS (Wireless

Transport Layer
Security)?

a security layer used in mobile devices that
employ the Wireless Applications Protocol
(WAP)

Packet Tracer Activity

9.4 Identify common preventive maintenance techniques for security

9.4.1 Explain how to upgrade signature
files for anti
-
virus and anti
-
spyware software

70.

What are the steps to update a signature
file?

1.

Set Windows Restore point

2.

Open the anti
-
virus or anti
-
spyware
program

3.

Locate the update control button
and select it

4.

After the program is updated, use it
to

scan your computer

5.

When the scan is completed, check
the report for viruses or other
problems that could not be treated
and delete them yourself

6.

Set the anti
-
virus or anti
-
spyware
program to automatically update
and to run on a scheduled basis

71.

What d
o virus, spyware, and adware
detection programs look for?

look for patterns in the programming code
of the software in a computer

72.

What are the code patterns called?

Signatures

73.

In order to ensure that the update is
authentic and not corrupt, whe
re should
you retrieve the signature files from:

Manufacture website

74.

What are mirrors?

signature files for download to multiple
download sites

9.4.2 Explain how to install operating system service packs and security patches

75.

Where do you get the
tools necessary to
remove viruses and repair the computer
code that has been modified?

Operating system manufactures and
security software companies

76.

What are patches?

code updates that manufacturers provide
to prevent a newly discovered virus or
worm
from making a successful attack

77.

What is a service pack?

manufacturers combine patches and
upgrades into a comprehensive update
application

Worksheet: OS Updates

9.5 Troubleshoot Security

78.

What are the steps in the troubleshooting
process?

1.

Diagnose

2.

Repair problems

9.5.1 Review the troubleshooting process

9.5.2 Identify common problems and solutions

79.

What can you do if a user is receiving
hundreds or thousands of junk emails each
day?

At the e
-
mail server, filter out email fron

the sender/s

80.

What can you do if an unauthorized access
point is discovered on the network?

Disconnect and confiscate the unauthorized
device. Enforce security policy by taking
action against the person responsible for
the security breech

81.

How can

you stop user with flash drives
from infecting computers on the network?

Prevent the use of removable mediaon the
network computers or set virus protection
software to scan removable medi when
data is accessed

Worksheet: Gather Information from the Cust
omer