Chapter 9 Study Guide(Hector)

advertisement
Chapter 9: Fundamental Security
Online Study Questions
Name: ____________________________________
9.1 Explain why security is important
1.
Who is affected by a lapse in security?
2.
How can a network or computer be
harmed?
3.
What are the primary responsibilities of a
technician
Worksheet: Security Attacks
9.2 Describe Security Attacks
4.
What is a physical threat?
5.
What is data threat?
6.
What is an internal threat?
7.
8.
What is a malicious threat?
What is an external threat?
9.
What is an unstructured threat?
10.
What is an structured threat?
9.2.1 Define viruses, worms and Trojans
11.
What is a virus?
12.
How are viruses transferred?
13.
What is the most damaging type of virus?
14.
What is a stealth virus?
15.
What is a worm?
16.
17.
18.
19.
Why is a worm harmful?
What is a Trojan?
What is anti-virus software?
How can the technician keep the anti-virus
software up to date?
Worksheet: Third party Anti-Virus Software
9.2.2 Explain web security
20.
Why is web security important?
21.
What is ActiveX?
22.
What is Java?
23.
What are examples of JavaScript?
9.2.3 Define adware, spyware and grayware
Everyone is affected
The performance of the computer can be
affected
To include network security and data
Steal, damage or destroy equipment
Attacks to corrupt or deny access
Unauthorized person has access to data and
equipment
An intent to cause damage to a computer
A user outside an organization that has
access to the server
Attackers have passwords to gain access to
run programs to harm the company
Attacker that uses codes to access the OS
software
Written with harmful intent
By opening or downloading a file
One that can record your keystrokes
A virus that can lie in dormant until
summoned by the attacker
A self-replicating program that is harmful to
networks
It consumes band with
A worm
Software designed to detect viruses
Regular maintenance
Many people use the web
Technology created by Microsoft to control
interactivity on a webpage
Programming language that allows applets
to run within a web browser
Interactive websites
24.
25.
26.
27.
What is adware?
What is grayware?
What is phishing?
What is spyware?
Activity: Adware, Spyware, Phishing
9.2.4 Explain Denial of Service
28.
What is denial of service?
29.
30.
What are two common DoS attacks?
What is a zombie?
9.2.5 Describe spam and popup windows
31.
What is spam?
32.
What are common indicators of spam?
9.2.6 Explain social engineering
33.
What is a social engineer?
34.
How can you protect again social
engineers?
9.2.7 Explain TXP/IP attacks
35.
What is a SYN flood?
36.
What is spoofing?
Programs that display advertising
A virus that may be harmful
A attacker pretends to be a legitimate user
Similar to adware but is installed without
the user knowing
An attack that prevents users from using
normal services
Ping of death and e mail bomb
Computers that are located at different
locations and makes it hard top trace origin
of attack
Junk mail
No subject line, computer generated e mail,
incomplete return address
An attacker that is able to gain access to
equipment by tricking people into giving
them personal information
Escort people around your facility
A virus that opens TCP ports randomly
Gains access to resources by pretending to
be a trusted computer
37.
What is a man-in-the-middle attack?
An attacker that institutes false information
38.
What is a Replay attack?
An attacker that uses sniffers to find
usernames or passwords
39.
What is DNS poisoning?
It changes DNS records to a false server
9.2.8 Explain data wiping, hard drive destruction and recycling
40.
What is hardware destruction?
Removing sensitive data
41.
What are the three methods commonly
Data wiping, hard drive destruction, hard
used to destroy or recycle data and hard
drive recycling
drives?
42.
What is data wiping?
Permanently deleting data from the hard
drive
43.
How can you fully ensure that data cannot
Shatter the platter with a hammer and
be recovered from a hard drive?
dispose of the piece
9.3 Identify Security Procedures
44.
How often should security plans be
Yearly
reviewed?
9.3.1 Explain what is required in a basic local security policy
45.
What questions should be covered in a
1. Process of handling
basic security policy?
2. Allowed behaviors
3. Prohibited behaviors
46.
47.
Who is responsible for security
Everyone
What are the recommended password
A complex combination of numbers and
guidelines?
uppercase and lowercase letters
9.3.2 Explain the tasks required to protect physical equipment
48.
What is the Trusted Platform Module
A chip installed on the motherboard used
(TPM)?
for hardware and software authentication
49.
How can you protect the access to your
Card keys that store user data
facility?
9.3.3 Describe ways to protect data
50.
What are the two levels of password
Login and BIOS
protection that are recommended?
51.
What password will prevent the operating
BIOS
system from booting?
52.
What is a lockout rule?
Stops user from attempting for a period of
time
53.
What is a VPN connection?
Allows remote access to other server with
encryption
54.
How does a VPN protect data?
By encrypting it
55.
What is traffic?
Data being transported on a network
56.
What is a software firewall?
A program that can deny traffic between the
computer and network
57.
When should backups be made?
Monthly
58.
Where should backups be stored?
To an offsite storage unit
59.
What is a smart card?
A small plastic card with a small chip in it
60.
What is biometric security?
Fingerprint or eye scanner
61.
What is a profile?
Data file containing known characteristics of
a user
62.
Which file system offers journaling and
NTFS
encryption capabilities?
63.
What utility do you run to convert from
CONVERT
Fat32 to NTFS?
9.3.4 Describe wireless security techniques
64.
What are the basic security settings that
Set up a password
should be configured on a wireless router
or access point?
65.
What is the SSID (service set identifier)?
Name of a wireless network
66.
What is the first generation security for
WEP
wireless?
67.
Which wireless encryption supports robust WPA
encryption provides government grade
security?
68.
Which wireless security protocol was
Lightweight extendable authentication
created by Cisco?
69.
What is WTLS (Wireless Transport Layer
Security layer used in mobile devices
Security)?
Packet Tracer Activity
9.4 Identify common preventive maintenance techniques for security
9.4.1 Explain how to upgrade signature files for anti-virus and anti-spyware software
70.
What are the steps to update a signature
1. Set a restore point
file?
2. Open anti-spyware program
3. Find update button
4. Scan computer
5. Check the report for viruses
71.
What do virus, spyware, and adware
Patterns in the programming code of
detection programs look for?
software
72.
What are the code patterns called?
Signatures
73.
In order to ensure that the update is
The manufacturers website
authentic and not corrupt, where should
you retrieve the signature files from:
74.
What are mirrors?
Allow manufacturers to distribute there
signatures
9.4.2 Explain how to install operating system service packs and security patches
75.
Where do you get the tools necessary to
From manufacturing security software
remove viruses and repair the computer
companies
code that has been modified?
76.
What are patches?
Code updates that prevent viruses or worms
form making an attack
77.
What is a service pack?
A number of patches and upgrades made
into a update
Worksheet: OS Updates
9.5 Troubleshoot Security
78.
What are the steps in the troubleshooting
1. Identify problem
process?
2. Establish probable causes
3. Determine exact cause
4. Implement a solution
5. Verify computer functionality
6. Document findings
9.5.1 Review the troubleshooting process
9.5.2 Identify common problems and solutions
79.
What can you do if a user is receiving
Filter out e mail senders
hundreds or thousands of junk emails each
day?
80.
What can you do if an unauthorized access Disconnect and confiscate unauthorized
point is discovered on the network?
device
81.
How can you stop user with flash drives
Prevent the use of removable media on
from infecting computers on the network?
network computers
Worksheet: Gather Information from the Customer
Download