IT Essentials Chapter 10 v5.0
- social engineering*
- anonymous keylogging
- spam
- DDoS
- ensuring that each use of an access card allows access to only one user at the time*
- ensuring that all operating system and antivirus software is up to date
- encrypting all sensitive data stored on the servers
- performing daily data backups
- registering and escorting all visitors to the premises*
- Perform daily data backups.
- Replace any software firewalls with a hardware firewall.
- Implement biometric authentication.*
- Ensure that all operating system and antivirus software is up to date.
- Disable the autorun feature in the operating system.*
- biometric authentication
- Trusted Platform Module (TPM)*
- card key access
- two-factor security
- Set virus protection software to scan removable media when data is accessed.*
- Configure the Windows Firewall to block the ports that are used by viruses.
- Enable the TPM in the CMOS settings.
- Repair, delete, or quarantine the infected files.
- Disable the autorun feature in the operating system.*
- when unauthorized users have changed the CMOS settings and the CMOS password must be reset
- when a virus has damaged the master boot record of the system disk*
- when a virus has damaged the boot sector of the system disk
- when the folder permissions for user members of a group are incorrect
- Set the user folder permissions to Deny.
- Disable the users’ accounts.
- Change the user file permissions to Read Only.
- Enable UAC on the computer.*
- Use data wiping.
- Drill through the HDD.
- Smash the platters with a hammer.*
- Immerse the HDD in a weak solution of bicarbonate of soda.
- WPA2*
- SSID hiding
- WEP
- wireless MAC filtering
- a token
- a TPM
- a private key*
- a DES key
- a public key*
- hides in a dormant state until needed by an attacker
- infects computers by attaching to software code
- executes when software is run on a computer
- is self-replicating*
- travels to new computers without any intervention or knowledge of the user*
- worm
- phishing*
- adware
- stealth virus
How should future expansion be done?
- What are the possible threats to the assets of the organization?*
- What is to be done in the case of a security breach?*
- When do the assets need protecting?
- What assets require protection?*
- What insurance coverage is required?
- a service pack
- patterns in the programming code of the software on a computer*
- mirror sites
- patches that prevent a newly discovered virus or worm from making a successful attack
- Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.
- All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
- All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.*
- Any traffic that comes into port 25 allows outgoing port 113 to be used.
- packet size
- physical addresses
- protocols*
- packet speed
- ports*
- to facilitate access to external networks
- to prevent the target server from being able to handle additional requests*
- to scan the data on the target server
- to obtain all addresses in the address book within the server
- Have you scanned your computer recently for viruses?
- What symptoms are you experiencing?*
- Did you open any attachments from a suspicious email message?
- Is your security software up to date?
- Install rogue antivirus software on the host.
- Log on to the host as a different user.
- Disable ActiveX and Silverlight on the host.
- Disconnect the host from the network.*
- Ensure the security policy is being enforced.*
- Check the computer for the latest OS patches and updates.
- Scan the computer with protection software.
- Verify the physical security of all offices.
- A virus has damaged the boot sector of the system disk.
- The computer has been infected with spyware.*
- UAC has been disabled on the computer.
- Folder permissions have been changed from Deny to Allow.
- mirrors
- signatures*
- virus definition tables
- grayware
No comments:
Post a Comment