9. Security Technology Flashcards

(16 cards)

1
Q

What is the purpose of virus scanners?

A

To prevent a virus from infecting the system

Virus scanners search for the signature of a known virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the two methods by which virus scanners work.

A
  • Signature matching
  • Behavior matching

Signature matching uses a list of known virus definitions, while behavior matching looks for typical virus behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two types of virus scanners based on their operation?

A
  • Ongoing virus scanners
  • On-demand virus scanners

Ongoing scanners run constantly in the background, while on-demand scanners run only when launched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does behavior matching in virus scanners attempt to detect?

A
  • Writing to the boot sector
  • Changing system files
  • Automating e-mail software
  • Self-multiplying

These behaviors are typical indicators of a virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of a firewall?

A

A barrier between your network and the outside world

Firewalls filter packets based on size, source IP, protocol, and destination port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name the types of firewalls mentioned.

A
  • Packet Filter
  • Stateful Packet Inspection
  • Application

Each type serves different functions in network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a dual-homed host in firewall configurations?

A

Installed on a server with at least two network interfaces

This setup allows communication between systems inside and outside the firewall without direct interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does antispyware do?

A

Scans for spyware

Antispyware checks for known spyware files and maintains updated definitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of intrusion-detection software (IDS)?

A

Inspects all inbound and outbound port activity

IDS scans for patterns that might indicate an attempted break-in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Differentiate between misuse detection and anomaly detection in IDS.

A
  • Misuse detection: Analyzes known attack signatures
  • Anomaly detection: Looks for unusual behaviors

Misuse detection relies on known patterns, while anomaly detection identifies deviations from normal access patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two types of IDS systems based on their response?

A
  • Passive systems
  • Reactive systems

Passive systems log information, while reactive systems take action against suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is PAP in authentication protocols?

A

Password Authentication Protocol

PAP is the simplest form of authentication and is the least secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does VPN stand for?

A

Virtual Private Network

VPNs create a virtual connection through the Internet with encrypted packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of WEP in WiFi security?

A

Uses the stream cipher RC4 to secure data

WEP employs a 40-bit key with a 24-bit initialization vector for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main feature of WPA2?

A

Uses the Advanced Encryption Standard (AES)

WPA2 provides data confidentiality, origin authentication, and integrity for wireless frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or false: WPA3 requires attackers to interact with your Wi-Fi for every password guess they attempt.

A

TRUE

This feature makes brute-force attacks less likely to succeed.