click below
click below
Normal Size Small Size show me how
securityCHPT5
terms
| Question | Answer |
|---|---|
| physical security | restricting access to the areas in which equipment is located |
| physical security | hardware locks |
| physical security | proximity readers |
| physical security | access lists |
| physical security | man traps |
| physical security | video surveillance |
| physical security | fencing |
| deadbolt lock | extends a solid metal bar into the doorframe for extra security |
| cipher lock | combination locks that use buttons which must be pushed in a sequence to unlock a door |
| cipher lock | keep a record of when the door was open and closed |
| disadvantage of cipher lock | shoulder surfing |
| proximity reader | detects an emitted signal in order to identify the owner |
| physical token | id badge |
| access lists | people who are allowed in |
| snap in | software module that provides admin capabilities for a device |
| group policy | microsoft windows feature that provides centralized management and configuration of computers |
| patch | general security software update inended to cover vulnerabilities that have been discovered |
| hotfix | software that addresses a specific customer situation and often may not be distributed outside that customers organization |
| service pack | software that is a cumulative package of all security updates plus additional features |
| most common type of door lock | standard key entry lock |
| group policy | allows a single configuration to be set and then deployed by many users |
| mantrap | monitors and controls two interlocking doors to a small room,vestibule,designed to seperate secure and nonsecure areas |
| fencing deterrents | anti climb paint |
| fencing deterrents | anti climb collar |
| fencing deterrents | roller barrier |
| fencing deterrents | rotating spikes |
| remote wipe sanitation | technology that can remotely erase data from a portable device and reset it back to factory default settings |
| rfid tags | radio frequency identification tags |
| steps in protecting the operating system that is running on the host | develop the security policy |
| steps in protecting the operating system that is running on the host | perform host software baselining |
| steps in protecting the operating system that is running on the host | configure operating system security and settings |
| steps in protecting the operating system that is running on the host | deploy the settings |
| steps in protecting the operating system that is running on the host | implement patch management |
| security template settings include | account policies |
| security template settings include | user rights |
| security template settings include | event log settings |
| security template settings include | restricted groups |
| security template settings include | system services |
| security template settings include | file permissions |
| security template settings include | registry permissions |
| mobile device security | gps tracking |
| mobile device security | remote wipe sanitation |
| mobile device security | voice encryption |
| antivirus software | examines a computer for infections as well as monitor activity |
| signature file | a sequence of bytes,strings, found in the virus as a virus signature |
| heuristic detection | create a virtualized environment to simulate the cpu and memory of the computer to check for a virus |
| bayesian filtering | spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if its spam |
| blacklist | no email is to be received |
| whitelist | only email can be received |
| popup blocker | program or feature within a browser that stops ads from appearing |
| anti spyware | helps prevent computers from becoming infected |
| firewall | hardware or software that is designed to prevent malicious packets from entering or leaving a pc |
| packet filter | firewall |
| host based software firewall | runs on a program on a local system to protect it against attacks |
| audit log | tracks user authentication attempts |
| access log | provides details regarding requests for specific files on a system |
| security log | considered the primary source of log data |
| event | occurence within a software system that is communicated to users or other programs outside of the operating system |
| system event | operational actions performed by the operating system,such as shutting down |
| system event logs | document any unsuccessful events and the most significant successful event |
| audit records | the second common type of security related operating system logs |
| common types of security application logs | anti virus software log |
| exceptions | faults that occur in an application while it is running |
| cross site request forgery | uses the users web browser settings to impersonate the user |
| input validation | verify a users input to an application |
| fuzz testing | fuzzing |
| fuzz testing | software testing technique that deliberatle provides invalid,unexpected, or random data as inputs to a computer program |
| data loss prevention | system of security tools that is used to recognize and identify data that is crucial and to ensure it is protected |
| dlp examines data in three states | data in use |
| dlp examines data in three states | data in motion |
| dlp examines data in three states | data at rest |
| content inspection | used by most data loss prevention systems |
| content inspection | defined as a secuirity analysis of the transaction within its approved context |
| data in use | actions being performed by endpoint devices such as printing |
| data in motion | actions that transmit the data across a network like a file being retreived from a server |
| data at rest | data that is stored on a dvd or other media |
| dlp agent | each host runs a local application which is sent over the network to the devices and runs as an os device |
| dlp agent | continuously monitors the host to identify sensitive data within the files |
| attacks based on application vulnerabilities | executable files attack |
| attacks based on application vulnerabilities | system tampering |
| attacks based on application vulnerabilities | process spawning control |
| application hardening | intended to prevent exploiting vulnerabilities in software applications |
| heuristic detection | code emulation |
| common types of security application logs | automatred patch update log |
| in application software, vulnerabilities are often exposed by a failure | to properly check the input data entering into the application |
| baseline | standard or checklist by which security standards can be evaluated and audited for security posture |
| baseline | operating system settings that impose how the policy will be enforced |