Chapter 9: Fundamental Security Online Study Questions Name: ____________________________________ 9.1 Explain why security is important 1. Who is affected by a lapse in security? 2. How can a network or computer be harmed? 3. What are the primary responsibilities of a technician Worksheet: Security Attacks 9.2 Describe Security Attacks 4. What is a physical threat? 5. What is data threat? 6. What is an internal threat? 7. 8. What is a malicious threat? What is an external threat? 9. What is an unstructured threat? 10. What is an structured threat? 9.2.1 Define viruses, worms and Trojans 11. What is a virus? 12. How are viruses transferred? 13. What is the most damaging type of virus? 14. What is a stealth virus? 15. What is a worm? 16. 17. 18. 19. Why is a worm harmful? What is a Trojan? What is anti-virus software? How can the technician keep the anti-virus software up to date? Worksheet: Third party Anti-Virus Software 9.2.2 Explain web security 20. Why is web security important? 21. What is ActiveX? 22. What is Java? 23. What are examples of JavaScript? 9.2.3 Define adware, spyware and grayware Everyone is affected The performance of the computer can be affected To include network security and data Steal, damage or destroy equipment Attacks to corrupt or deny access Unauthorized person has access to data and equipment An intent to cause damage to a computer A user outside an organization that has access to the server Attackers have passwords to gain access to run programs to harm the company Attacker that uses codes to access the OS software Written with harmful intent By opening or downloading a file One that can record your keystrokes A virus that can lie in dormant until summoned by the attacker A self-replicating program that is harmful to networks It consumes band with A worm Software designed to detect viruses Regular maintenance Many people use the web Technology created by Microsoft to control interactivity on a webpage Programming language that allows applets to run within a web browser Interactive websites 24. 25. 26. 27. What is adware? What is grayware? What is phishing? What is spyware? Activity: Adware, Spyware, Phishing 9.2.4 Explain Denial of Service 28. What is denial of service? 29. 30. What are two common DoS attacks? What is a zombie? 9.2.5 Describe spam and popup windows 31. What is spam? 32. What are common indicators of spam? 9.2.6 Explain social engineering 33. What is a social engineer? 34. How can you protect again social engineers? 9.2.7 Explain TXP/IP attacks 35. What is a SYN flood? 36. What is spoofing? Programs that display advertising A virus that may be harmful A attacker pretends to be a legitimate user Similar to adware but is installed without the user knowing An attack that prevents users from using normal services Ping of death and e mail bomb Computers that are located at different locations and makes it hard top trace origin of attack Junk mail No subject line, computer generated e mail, incomplete return address An attacker that is able to gain access to equipment by tricking people into giving them personal information Escort people around your facility A virus that opens TCP ports randomly Gains access to resources by pretending to be a trusted computer 37. What is a man-in-the-middle attack? An attacker that institutes false information 38. What is a Replay attack? An attacker that uses sniffers to find usernames or passwords 39. What is DNS poisoning? It changes DNS records to a false server 9.2.8 Explain data wiping, hard drive destruction and recycling 40. What is hardware destruction? Removing sensitive data 41. What are the three methods commonly Data wiping, hard drive destruction, hard used to destroy or recycle data and hard drive recycling drives? 42. What is data wiping? Permanently deleting data from the hard drive 43. How can you fully ensure that data cannot Shatter the platter with a hammer and be recovered from a hard drive? dispose of the piece 9.3 Identify Security Procedures 44. How often should security plans be Yearly reviewed? 9.3.1 Explain what is required in a basic local security policy 45. What questions should be covered in a 1. Process of handling basic security policy? 2. Allowed behaviors 3. Prohibited behaviors 46. 47. Who is responsible for security Everyone What are the recommended password A complex combination of numbers and guidelines? uppercase and lowercase letters 9.3.2 Explain the tasks required to protect physical equipment 48. What is the Trusted Platform Module A chip installed on the motherboard used (TPM)? for hardware and software authentication 49. How can you protect the access to your Card keys that store user data facility? 9.3.3 Describe ways to protect data 50. What are the two levels of password Login and BIOS protection that are recommended? 51. What password will prevent the operating BIOS system from booting? 52. What is a lockout rule? Stops user from attempting for a period of time 53. What is a VPN connection? Allows remote access to other server with encryption 54. How does a VPN protect data? By encrypting it 55. What is traffic? Data being transported on a network 56. What is a software firewall? A program that can deny traffic between the computer and network 57. When should backups be made? Monthly 58. Where should backups be stored? To an offsite storage unit 59. What is a smart card? A small plastic card with a small chip in it 60. What is biometric security? Fingerprint or eye scanner 61. What is a profile? Data file containing known characteristics of a user 62. Which file system offers journaling and NTFS encryption capabilities? 63. What utility do you run to convert from CONVERT Fat32 to NTFS? 9.3.4 Describe wireless security techniques 64. What are the basic security settings that Set up a password should be configured on a wireless router or access point? 65. What is the SSID (service set identifier)? Name of a wireless network 66. What is the first generation security for WEP wireless? 67. Which wireless encryption supports robust WPA encryption provides government grade security? 68. Which wireless security protocol was Lightweight extendable authentication created by Cisco? 69. What is WTLS (Wireless Transport Layer Security layer used in mobile devices Security)? Packet Tracer Activity 9.4 Identify common preventive maintenance techniques for security 9.4.1 Explain how to upgrade signature files for anti-virus and anti-spyware software 70. What are the steps to update a signature 1. Set a restore point file? 2. Open anti-spyware program 3. Find update button 4. Scan computer 5. Check the report for viruses 71. What do virus, spyware, and adware Patterns in the programming code of detection programs look for? software 72. What are the code patterns called? Signatures 73. In order to ensure that the update is The manufacturers website authentic and not corrupt, where should you retrieve the signature files from: 74. What are mirrors? Allow manufacturers to distribute there signatures 9.4.2 Explain how to install operating system service packs and security patches 75. Where do you get the tools necessary to From manufacturing security software remove viruses and repair the computer companies code that has been modified? 76. What are patches? Code updates that prevent viruses or worms form making an attack 77. What is a service pack? A number of patches and upgrades made into a update Worksheet: OS Updates 9.5 Troubleshoot Security 78. What are the steps in the troubleshooting 1. Identify problem process? 2. Establish probable causes 3. Determine exact cause 4. Implement a solution 5. Verify computer functionality 6. Document findings 9.5.1 Review the troubleshooting process 9.5.2 Identify common problems and solutions 79. What can you do if a user is receiving Filter out e mail senders hundreds or thousands of junk emails each day? 80. What can you do if an unauthorized access Disconnect and confiscate unauthorized point is discovered on the network? device 81. How can you stop user with flash drives Prevent the use of removable media on from infecting computers on the network? network computers Worksheet: Gather Information from the Customer