Shared Flashcard Set

Details

Security ch 13-14
Security ch 13-14
46
Computer Science
Undergraduate 1
09/28/2013

Additional Computer Science Flashcards

 


 

Cards

Term
Which UNIX command can be used to show the patches that are installed for a specific software package?
Definition
pkgparam
Term
How does stateful packet filtering differ from basic packet filtering?
Definition
b. Stateful packet filtering looks at the packets in relation to other packets.
Term
Adding more services and applications to a system helps to harden it.
Definition
false
Term
Which of the following is NOT a general step in securing a networking device?
Definition
c. Maintaining SNMP community strings Correct
Term
Which of the following is NOT an advantage of network-based IDS?
Definition
b. They can reduce false positive rates.
Term
A _________ is a more formal, large software update that may address several or many software problems.
Definition
Patch
Term
Windows Defender does all of the following EXCEPT:
Definition
c. Spam filtering
Term
Run levels are used to
Definition
b. Describe the state of initialization and what system services are operating in a Linux system Correct
Term
While NIDS are able to detect activities such as port scans and brute force attacks, it is unable to detect tunneling.
Definition
false
Term
Service pack is the term given to a small software update designed to address a specific problem, such as a buffer overflow in an application that exposes the system to attacks.
Definition
false
Term
A new breed of IDS that is designed to identify and prevent malicious activity from harming a system.
Definition
HIPS
Term
One of the advantages of HIDS is that
Definition
a. They can reduce false-positive rates
Term
Only active intrusion detection systems (IDS) can aggressively respond to suspicious activity, whereas passive IDS cannot.
Definition
TRUE
Term
Network-based IDS examines activity on a system such, as a mail server or web server.
Definition
FALSE
Term
Which UNIX command would you use to change permissions associated with a file or directory?
Definition
chmod
Term
What is the process of establishing a system's security state called?
Definition
baselining
Term
Simple rule sets that are applied to port number and IP addresses are called
Definition
c. Access control lists
Term
On a UNIX system, if a file has the permission r-x rw- ---, what permission does the world have?
Definition
d. No permissions
Term
Hotfixes are usually smaller than patches, and patches are usually smaller than service packs.
Definition
true
Term
Which of the following is NOT a component of an IDS?
Definition
c. Expert knowledge database
Term
What must you do in order to sniff the traffic on all ports on a switch?
Definition
c. Enable port mirroring.
Term
Service pack is the term given to a small software update designed to address a specific problem, such as a buffer overflow in an application that exposes the system to attacks.
Definition
false
Term
What is the first step in addressing issues with passwords?
Definition
a. The first step in addressing password issues is to create an effective and manageable password policy that both system administrators and users can work with. Correct
Term
Only active intrusion detection systems (IDS) can aggressively respond to suspicious activity, whereas passive IDS cannot.
Definition
true
Term
Permissions under Linux are the same as for other UNIX-based operating systems.
Definition
true
Term
Which of the following is NOT an advantage of network-based IDS?
Definition
b. They can reduce false positive rates. Correct
Term
When hardening Mac OS X, the same guidelines for all UNIX systems apply.
Definition
true
Term
Which of the following is true of the registry permissions area settings in security templates?
Definition
c. They control who can access the registry and how it can be accessed.
Term
Antivirus products do all of the following EXCEPT:
Definition
c. Block network traffic based on policies
Term
The security tool that will hide information about the requesting system and make the browsing experience secret is a
Definition
c. Anonymizing proxy
Term
Hardening applications is similar to hardening operating systems, in that you remove functions that are not needed, restrict access where you can, and make sure the application is up to date with patches.
Definition
true
Term
Hostile activity that does not match an IDS signature and goes undetected is called a false positive.
Definition
false
Term
The model that most modern intrusion detection systems use is largely based upon a model created by Dorothy Denning and Peter Neumann called:
Definition
c. Intrusion Detection Expert System (IDES)
Term
Which of the following is NOT a component of an IDS?
Definition
c. Expert knowledge database
Term
An initial baseline should be performed when?
Definition
c. After administrators have finished patching, securing, and preparing a system
Term
The nuisance of web pages that automatically appear on top of your current web page can be remedied with
Definition
c. Pop-up blockers
Term
Which of the following is the command to stop a service in UNIX?
Definition
kill
Term
Securing access to files and directories in Solaris is vastly different from most UNIX variants.
Definition
true
Term
A sniffer must use a NIC in promiscuous mode; otherwise it will not see all the network traffic coming into the NIC.
Definition
fALSE
Term
Which of the following is NOT a UNIX file permission?
Definition
WRITE
Term
Network-based IDS examines activity on a system such, as a mail server or web server.
Definition
FALSE
Term
The NIDS signature database is usually much larger than that of a host-based system.
Definition
TRUE
Term
A sniffer must use a NIC in promiscuous mode; otherwise it will not see all the network traffic coming into the NIC.
Definition
FALSE
Term
How does IPS differ from an IDS?
Definition
c. IPS will block, reject, or redirect unwanted traffic; an IDS will only alert.
Term
Linux and other operating systems use the _______ command to change the read-write-execute properties of a file or directory.
Definition
CHMOD
Term
Mac OS X FileVault encrypts files with 3DES encryption.
Definition
FALSE
Supporting users have an ad free experience!