Shared Flashcard Set

Details

Chapter 19
System Security
52
Computer Science
Not Applicable
07/21/2010

Additional Computer Science Flashcards

 


 

Cards

Term

 

 

 

 

Access Control

Definition

 

Which of the following terms refers to the prevention of unauthorized disclosure of keys?

 

Authentication

Integrity

Access control

Nonrepudiation

Term

 

 

 

Default systems adminstrator account

Definition

 

 

 

 

What is a hackers favorite target account on Microsoft's SQL Server?

Term

 

 

 

 

Biometrics

Definition

 

 

 

 

You're in the process of securing the IT infrastructure by adding fingerprint scanners to your existing authentication methods. This type of security is an example of what?

Term

 

 

 

 

.SCR

Definition

 

 

Which of the following file extensions should not be allowed with an e-mail attachment?

 

.DOC

.SCR

.TXT

.XLS

Term

 

 

 

 

DoS

Definition

 

 

 

Which type of attack denies authorized users access to network resources?

Term

 

 

 

 

DDoS

Definition

 

 

 

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?

Term

 

 

 

 

Back Door

Definition

 

 

 

A server in your network has a program running on it that bypasses authentication. Which type of attack has occured?

Term

 

 

 

 

Replay Attack

Definition

 

 

 

You've discovered that an expired certificate is being used repeatedly to gain logon privileges. Which type of attack is this mostly likely to be?

Term

 

 

 

 

TCP/IP Hijacking

Definition

 

 

 

A junior administrator comes to you in a panic. After looking at the log files, he has become convinced that an attacker is attempting to use an IP address to replace another system in the network to gain access. Which type of attack is this?

Term

 

 

 

 

TCP ACK attack

Definition

 

 

 

A server on your network will no longer accept communication using the TCP protocol. The server indicates that it has exceeded its session limit. Which type of attack is this?

Term

 

 

 

 

ICMP

Definition

 

 

 

A smurf attack attempts to use a broadcast ping on a network; the return address of the ping may be a valid system in your network. Which protocol does a smurf attack use to conduct the attack?

Term

 

 

 

Password-guessing attack

Definition

 

 

 

Your system log files report an ongoing attempt to gain access to a single account. This attempt has been unsucessful to this point. What type of attack are you most likely experiencing?

Term

 

 

 

Windows Defender

Definition

 

Which of the following programs can identify spyware and unwanted software on a Windows Vista machine?

 

Windows Defender

System Integrity Checker

NetBus

Recovery Console

Term

 

 

 

 

Phage

Definition

 

Which of the following types of viruses modifies and alters other programs and databases?

 

Talkabout

Backdoor

Phage

Hijack

Term

 

 

 

 

Task Scheduler

Definition

 

 

 

What could be used with Windows to configure running an antivirus program if the program itself lacked such a feature?

Term

 

 

 

 

Windows XP Professional

Definition

 

 

In which of the following operating system is EFS fully supported?

 

Windows XP Pro

Windows Home Basic

Windows Home Premium

Windows Vista Starter

Term

 

 

 

 

Vulnerability Scanner

Definition

 

Which of the following is a software application that checks your network for any known security holes?

 

Man-in-the-middle

Vulnerability scanner

Worm

Port check

Term

 

 

 

gpedit.msc

Definition

 

 

 

Which of the following is the Group Policy Editor?

 

gpedit.msc

regedit.exe

poledit.com

group.sh

Term

 

 

 

 

security baseline

Definition

 

 

 

A _____ defines the level of security that will be implemented and maintained.

Term

 

 

 

 

polymorphic, stealth, retrovirus, multipartite, armored, companion, phage, and macro viruses.

Definition

 

 

 

Viruses can be classified in one of 8 groups. What are they?

Term

 

 

 

 

Render your system inoperable, and spread to other systems.

Definition

 

 

 

A virus, in most cases, tries to accomplish one of two things. What are they?

Term

 

 

 

 

Armored viruses

Definition

 

 

 

What viruses cover themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus?

Term

 

 

 

 

Companion Virus

Definition

 

 

 

A _______ attaches itself to legitimate programs and then creates a program with a different extension. When a user types the name of the legitimate program, this virus executes instead of the real program.

Term

 

 

 

 

Macro Virus

Definition

 

 

 

 

This virus exploits the enhancements made to many application programs. Which type of virus does this?

Term

 

 

 

Multipartite Virus

Definition

 

 

 

A ______ attacks your system in multiple ways. It may attempt to infect your boot sector, infect all of your executable files, and destroy your application files.

Term

 

 

 

Phage Virus

Definition

 

 

 

The only way to remove this type of virus is to reinstall the programs that are infected. If you miss even a single incident of this virus on the victim system, the process will start again and infect the system once more. It modifies and alters other programs and databases. What type is this?

Term

 

 

 

 

Polymorphic viruses

Definition

 

 

 

 

_______ change form in order to avoid detection. These types of viruses attack your system, display a message on your computer, and delete files on your system.

Term

 

 

 

 

Signature

Definition

 

 

 

A _____ is an algorithm or other element of a virus that uniquely identifies it.

Term

 

 

 

Retrovirus

Definition

 

 

 

Which type of virus can directly attack your antivirus software and potentially destroy the virus definition database file?

Term

 

 

 

 

Stealth Virus

Definition

 

 

 

Which type of virus redirects commands around itself in order to avoid detection?

Term

 

 

 

Back door

Definition

 

 

 

This refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker.

Term

 

 

 

 

IP spoofing

Definition

 

 

 

 

The goal of this type of spoofing attack is to make the data look like it came form a trusted host when it didn't.

Term

 

 

 

 

DNS spoofing

Definition

 

 

 

With this type of spoofing, the DNS server is given information about a name server that it thinks is legitimate when it isn't.

Term

 

 

 

Brute Force, and Dictionary

Definition

 

 

 

There are 2 types of password guessing attacks, what are they?

Term

 

 

 

 

Ping of Death, and Buffer Overflow

Definition

 

 

 

         What are 2 of the most common types of        

DoS (Denial of Service) attacks?

Term

 

 

 

Ping of Death

Definition

 

 

 

This type of DoS attack crashes a system by sending ICMP packets that are larger than the system can handle.

Term

 

 

 

 

DDoS (Distributed Denial-of-Service)

Definition

 

 

 

This type of attack uses multiple computer systems to conduct an attack against a single organization.

Term

 

 

 

 

TCP sequence number attack

Definition

 

 

 

In this type of attack, the attacker intercepts and then responds with a sequence number similar to the one used in the orginal session?

Term

 

 

 

Active Sniffing

Definition

 

 

 

TCP/IP hijacking is also called what?

Term

 

 

 

UDP attack

Definition

 

 

 

This attack type attacks either a maintenance protocol or a UDP service in order to overload services and initiate a DoS situation.

Term

 

 

 

 

Recovery Console

Definition

 

 

 

This is a command-line utility used for troubleshooting. From it, you can format drives, stop and start services, and interact with files.

Term

 

 

 

ASR Wizard

Definition

 

 

 

 

Its possible to automate the process of creating a system recovery set by choosing the _______ on the tools menu of the Backup utility.

Term

 

 

 

 

Microsoft Security Baseline Analyzer

Definition

 

 

 

 

Microsoft provides a tool for establishing a security baseline and for subsequent evaluations of security in Windows 2000 and higher OS's. What is this tool called?

Term

 

 

 

 

SFC.exe

Definition

 

 

 

 

____ automatically verifies system files after a reboot to see if they were changed to unprotected copies. If an unprotected file is found, its overwritten by a stored copy of the system file.

Term

 

 

 

 

Hardening

Definition

 

 

 

The process of reducing or eliminating weaknesses, securing services, and attempting to make your enviroment immune to attacks is called what?

Term

 

 

 

Hotfixes

Definition

 

 

 

 

 

______ are used to make repairs to a system during normal operation, even though they may require a reboot.

Term

 

 

 

 

Service Pack

Definition

 

 

 

 

A ______ is a comprehensive set of fixes consolidated into a single product. May be used to address a large number of bugs or to introduce new capabilities in an OS.

Term

 

 

 

 

Patches

Definition

 

 

 

 

A temporary or quick fix to a program is called what?

Term

 

 

 

 

ACL's (Access Control Lists)

Definition

 

 

 

 

These enable devices in your network to ignore requests from specified users or systems, or to grant them certain network capabilities.

Term

 

 

 

 

Computer Configuration, and

 

User Configuration

Definition

 

 

 

 

A local policy has 2 primary divisions. What are they?

Term

 

 

 

 

 

System Configuration Utility

Definition

 

 

 

 

MSCONFIG is also known as what?

Term

 

 

 

 

Vulnerability Scanner

Definition

 

 

 

 

this is a software application that checks your network for any known security holes.

Supporting users have an ad free experience!