Deck 7: Host Hardening
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
Play
Full screen (f)
Deck 7: Host Hardening
1
If an attacker takes over a firewall, he or she will be able to ________.
A) allow connection-opening requests that violate policy
B) reroute internal data to alternate paths
C) provide the false sense that the firewall is still working correctly
D) All of the above
A) allow connection-opening requests that violate policy
B) reroute internal data to alternate paths
C) provide the false sense that the firewall is still working correctly
D) All of the above
D
2
Systems administrators generally do not manage the network.
True
3
________ are sets of specific actions to be taken to harden all hosts of a particular type and of particular versions within each type.
A) Processes
B) Security baselines
C) Procedures
D) None of the above
A) Processes
B) Security baselines
C) Procedures
D) None of the above
B
4
A company should not replace default passwords during configuration.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
A systems administrator may manage ________.
A) an individual host
B) a group of hosts
C) Both A and B
D) Neither A nor B
A) an individual host
B) a group of hosts
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
A ________ is an individual application on the tree pane of an MMC that can be added or dropped from the tree list easily.
A) snap-in
B) management application
C) administrative application
D) Action
A) snap-in
B) management application
C) administrative application
D) Action
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Systems administrators manage individual hosts but not groups of hosts.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
Any device with an IP address is a host.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
The Microsoft Windows Server interface looks like the interface in ________.
A) client versions of Microsoft Windows
B) UNIX
C) Both A and B
D) Neither A nor B
A) client versions of Microsoft Windows
B) UNIX
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
MMCs are administrative used to manage ________ servers.
A) Apple
B) Microsoft
C) UNIX
D) All of the above
A) Apple
B) Microsoft
C) UNIX
D) All of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
________ is necessary to protect the host against attacks.
A) Host hardening
B) Host bulwarking
C) Host shielding
D) None of the above
A) Host hardening
B) Host bulwarking
C) Host shielding
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
If an attacker takes over a router, he or she will be able to ________.
A) map the entire internal network
B) reroute traffic to cause a local DoS
C) Both A and B
D) Neither A nor B
A) map the entire internal network
B) reroute traffic to cause a local DoS
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following are elements of host hardening?
A) Encrypting data on the host
B) Read operating system log files
C) Both A and B
D) Neither A nor B
A) Encrypting data on the host
B) Read operating system log files
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
When you use your mobile firm to surf the Internet, it is a host.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following statements is not an accurate description of MMCs?
A) MMCs are produced by Microsoft.
B) MMCs are located under the Start / Management menu choice.
C) MMCs use GUIs.
D) MMCs are relatively easy to learn to use.
A) MMCs are produced by Microsoft.
B) MMCs are located under the Start / Management menu choice.
C) MMCs use GUIs.
D) MMCs are relatively easy to learn to use.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following security protections are provided by recent version of Windows Server?
A) Server software firewalls
B) The ability to encrypt data
C) Both A and B
D) Neither A nor B
A) Server software firewalls
B) The ability to encrypt data
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Any device with an IP address is a ________.
A) server
B) host
C) client
D) None of the above
A) server
B) host
C) client
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following are elements of host hardening?
A) Minimizing applications on the host
B) Having a good border firewall
C) Both A and B
D) Neither A nor B
A) Minimizing applications on the host
B) Having a good border firewall
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
In MMCs, the tree pane lists ________.
A) objects on which actions can be taken
B) actions that can be taken on the selected object
C) Both A and B
D) Neither A nor B
A) objects on which actions can be taken
B) actions that can be taken on the selected object
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Microsoft's server operating system is called ________.
A) UNIX
B) Windows Server
C) Both A and B
D) Neither A nor B
A) UNIX
B) Windows Server
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
A(n) ________ is defined as an attack that comes before fixes are released.
A) exploit
B) zero-day attack
C) worm
D) anomaly attack
A) exploit
B) zero-day attack
C) worm
D) anomaly attack
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
A LINUX distribution consists only of the LINUX kernel.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
An attack that comes before fixes are released is called a vulnerability attack.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
UNIX command line interfaces are called ________.
A) shells
B) GUIs
C) Both A and B
D) Neither A nor B
A) shells
B) GUIs
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
The core part of the LINUX operating system is called ________.
A) the foundation
B) UNIX
C) GNU
D) the kernel
A) the foundation
B) UNIX
C) GNU
D) the kernel
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
CLIs usually are easier to learn than GUIs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
CLI shells use more system resources than GUIs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) ________ is a security weakness that makes a program vulnerable to attack.
A) attack vector
B) exploit
C) vulnerability
D) All of the above
A) attack vector
B) exploit
C) vulnerability
D) All of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
________ is a family of operating systems that share interoperability at the kernel level.
A) UNIX
B) LINUX
C) Both A and B
D) Neither A nor B
A) UNIX
B) LINUX
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
Different UNIX versions have different security methods.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
The cost of ________ LINUX is definitely far less than the cost of commercial operating systems such as Windows.
A) purchasing
B) using
C) Both A and B
D) Neither A nor B
A) purchasing
B) using
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
What is the name for a small program that fixes a particular vulnerability?
A) Work-around
B) Patch
C) Service pack
D) Version upgrade
A) Work-around
B) Patch
C) Service pack
D) Version upgrade
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
________ is a version of ________ for PCs.
A) LINUX, UNIX
B) UNIX, LINUX
C) Both A and B
D) Neither A nor B
A) LINUX, UNIX
B) UNIX, LINUX
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
Attackers frequently create exploits within hours or days after a fix is released by a vendor.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
A specific distribution of UNIX comes with multiple user interfaces.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) ________ is a program that takes advantage of a(n) ________.
A) exploit, vulnerability
B) vulnerability, exploit
C) Both A and B
D) Neither A nor B
A) exploit, vulnerability
B) vulnerability, exploit
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
A ________ is a type of fix for vulnerabilities.
A) work-around
B) service pack
C) Both A and B
D) Neither A nor B
A) work-around
B) service pack
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
A Microsoft Windows Service Pack is a group of vulnerability fixes and sometimes functionality improvements.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
A patch is a labor-intensive process of manual steps that a firm must do to address a vulnerability.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is not a type of fix for vulnerabilities?
A) Work-arounds
B) Patches
C) Version upgrades
D) All of the above are types of fixes for vulnerabilities
A) Work-arounds
B) Patches
C) Version upgrades
D) All of the above are types of fixes for vulnerabilities
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
A Windows systems administrator should use the Administrator account ________.
A) as little as possible, and only when needed
B) as his or her main account, for auditability
C) his or her main account, for the permissions it provides
D) None of the above. The Windows systems administrator should never user the Administrator account.
A) as little as possible, and only when needed
B) as his or her main account, for auditability
C) his or her main account, for the permissions it provides
D) None of the above. The Windows systems administrator should never user the Administrator account.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
The act of taking over a super user account is called hacking root.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
Many firms prioritize patches because the cost of installing all patches it too high.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
Assigning security measures to groups is ________ than assigning security measures to individuals within groups.
A) cheaper
B) less accurate
C) Both A and B
D) Neither A nor B
A) cheaper
B) less accurate
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
Software vendors typically release ________ patches per product in a typical year.
A) many
B) a few
C) no
A) many
B) a few
C) no
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
LINUX commonly uses the rpm method to download patches.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
The super user account has ________ control over the computer.
A) total or nearly total
B) substantial but not nearly total
C) little
D) no
A) total or nearly total
B) substantial but not nearly total
C) little
D) no
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
The super user account in Windows is called root.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
To get to the super user account in UNIX, the administrator should use the ________ command.
A) RunAs
B) su
C) rlogin
D) None of the above
A) RunAs
B) su
C) rlogin
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
The super user account in Windows is called the ________.
A) root
B) Administrator
C) MMC
D) Super
A) root
B) Administrator
C) MMC
D) Super
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
To get to the super user account in Windows, the administrator can use the ________ command.
A) RunAs
B) su
C) rlogin
D) None of the above
A) RunAs
B) su
C) rlogin
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
________ can greatly reduce patching costs.
A) Vulnerability management servers
B) Manual downloads
C) Patch management servers
D) All of the above
A) Vulnerability management servers
B) Manual downloads
C) Patch management servers
D) All of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
Assigning security measures to individuals within groups is cheaper than assigning security measures to groups.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
Assigning security measures to groups is better than assigning security measures to individuals within groups because ________.
A) applying security measures to groups takes less time than applying them individually
B) applying security measures in groups reduces errors in assigning security settings
C) Both A and B
D) Neither A nor B
A) applying security measures to groups takes less time than applying them individually
B) applying security measures in groups reduces errors in assigning security settings
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
The Local Users and Groups snap-in is available on the ________ MMC.
A) Computer Management
B) Security
C) Permissions
D) Local Permissions
A) Computer Management
B) Security
C) Permissions
D) Local Permissions
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
The super user account in UNIX is called ________.
A) root
B) administrator
C) MMC
D) kernel
A) root
B) administrator
C) MMC
D) kernel
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
To get to the super user account in UNIX, the administrator can use the RunAs command.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
Vulnerability patches can result in a loss of functionality in the patched host.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Since Windows Server 2003, servers can be programmed to check for updates automatically.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
It generally is a good idea from a security point of view to upgrade to a new version of an operating system.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
According to the book, r%Dv$ is a strong password.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Inheritance can be modified from the ________ box in the security tab.
A) allow permissions
B) deny permissions
C) Both A and B
D) Neither A nor B
A) allow permissions
B) deny permissions
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
________ is a password-cracking method wherein the attacker tries all possible passwords, starting with single-character passwords.
A) A dictionary attack
B) A hybrid dictionary attack
C) A combinatorial attack
D) Brute-force guessing
A) A dictionary attack
B) A hybrid dictionary attack
C) A combinatorial attack
D) Brute-force guessing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
UNIX allows permissions to be assigned to ________.
A) the account that owns the file or directory
B) a group associated with the directory
C) everyone else
D) All of the above
A) the account that owns the file or directory
B) a group associated with the directory
C) everyone else
D) All of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
Inheritance ________ labor costs in assigning permissions.
A) increases
B) reduces
C) inheritance does not significantly change the labor costs in assigning permissions
D) None of the above
A) increases
B) reduces
C) inheritance does not significantly change the labor costs in assigning permissions
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
UNIX offers more directory and file permissions than Windows.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
To how many accounts and groups can different permissions be applied in Windows?
A) 3
B) 6
C) 100
D) almost an unlimited number
A) 3
B) 6
C) 100
D) almost an unlimited number
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
The book recommends that passwords be at least ________ characters long.
A) 6
B) 8
C) 20
D) 100
A) 6
B) 8
C) 20
D) 100
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
In UNIX, the Execute permission gives the permission to make changes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
________ is a password-cracking method wherein the attacker compares passwords to lists of common words.
A) A dictionary attack
B) A hybrid dictionary attack
C) A combinatorial attack
D) Brute-force guessing
A) A dictionary attack
B) A hybrid dictionary attack
C) A combinatorial attack
D) Brute-force guessing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
Long passwords that use several types of keyboard characters are called ________ passwords.
A) complex
B) reusable
C) dictionary
D) one-time
A) complex
B) reusable
C) dictionary
D) one-time
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
In UNIX, the ________ permission allows the user to make changes.
A) execute
B) write
C) read
D) modify
A) execute
B) write
C) read
D) modify
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
Which is not one of the three UNIX permissions?
A) Read
B) Write
C) List folder contents
D) Execute
A) Read
B) Write
C) List folder contents
D) Execute
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
Password hashes are created when a password is passed from a user to a hashing function.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following is not a standard Windows privilege?
A) Modify
B) All
C) Read & execute
D) List folder contents
A) Modify
B) All
C) Read & execute
D) List folder contents
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
In Windows, a user's effective permissions are all those inherited from its parent directory plus any specifically allowed permission, minus those denied.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
Stealing the password file from a computer is safer than attempting to log in remotely.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
________ allows many different groups to be assigned different permissions.
A) Windows
B) UNIX
C) Both A and B
D) Neither A nor B
A) Windows
B) UNIX
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
UNIX offers ________ directory and file permissions than (as) Windows.
A) fewer
B) more
C) about the same number of
D) None of the above
A) fewer
B) more
C) about the same number of
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
Windows offers only 3 directory permissions.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck