• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back

Which system should have personal firewalls setup?

  1. Mobile i.e. Laptops and devices that can be connected to other networks.
  2. Specific servers to ensure that communication to that server is limited.

Name five features of personal firewalls

  1. Block incoming traffic
  2. Block outgoing traffic
  3. Notification
  4. A default rule (deny all traffic unless it is a response)
  5. Create rules

What are TCP Wrappers?

Used in Linux to control access to different services i.e. Telnet, SSH, or FTP.




Configured in in two files: /etc/hosts.allow, /etc/hosts.deny


Remember host.allow is read first

What is HIDS?

A host-based intrusion detection system that monitors activity (application based anomaly) on the system and alerting about suspicious activity.

Name five of the areas that HIDS monitor?

  1. Memory (suspicious programs running)
  2. System files (uses hash values database)
  3. Log files
  4. File System (Changes to files)
  5. Connections (port scans)

One of the limitation of a network-base IDS is?

(Packet based anomaly) If the traffic is encrypted the IDS is unable to analyze it and NIDS cannot decipher information.

Does encryption hinder HIDS?

No Host based software decrypts the encrypted communication and then logs the activity and then HIDS looks for suspicious activity in the unencrypted files.


HIDS involves installing an agent on the local host that monitors and reports on the system configuration and application activity

What is the first line of defense against malicious software?

Antivirus Software

Name four Data Policy elements that should be included in your Security Policy?

  1. Wiping
  2. Disposing
  3. Retention
  4. Storage

What is:


  1. TPM
  2. HSM
  3. Mobile Device encryption
  1. Trusted Platform Module is a computer chip on system that stored the cryptographic keys that are used to encrypt data. TPM has a dictionary attack prevention module built in.
  2. Hardware Security Module is a card that contains a crypto-processor to perform asymmetric crypto functions and store keys
  3. USB and hard drive encryption.

What should one consider before storing data in the cloud?

The company's security policy for storing the data.



What security item must be taken in to account when using a SAN?

When using a Storage Area Network device close attention must be paid to the configuration.

What security two item must be taken in to account when storing Big Data?

Handling Big Data




  1. It must be stored in a secure state.
  2. It must be accessed in a secure manner.

What is a big drawback with VoIP?

VoIP will suffer from delay.

What is Data Loss Prevention (DLP)?

DLP is a hardware and software solution that performs deep content inspection of data(such as e-mail bodies and attachments to prevent information leakage.

What are Hardware Security Modules (HSM)?

Devices that are designed to handle cryptographic duties allowing servers to focus on other tasks.

What is the Encrypting File System (EFS)?

Software used to encrypt data.can be used with NTFS 3.0

What kind of control is a Firewall?

Protective