Network Security Policies and Email Security
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of database is used to authenticate administrative users in network devices?

  • Access database
  • Security database
  • User database
  • Authentication database (correct)

What is the primary function of the Email Security Appliance (ESA)?

  • To store email messages
  • To filter spam and suspicious emails (correct)
  • To manage user access
  • To secure email servers

Which of the following is NOT a function of the Email Security Appliance (ESA)?

  • Filtering spam
  • Blocking suspicious attachments
  • Identifying phishing attempts
  • Sending promotional emails (correct)

Which network function is primarily concerned with user authentication?

<p>User authentication (B)</p> Signup and view all the answers

What type of threats does the Email Security Appliance (ESA) primarily address?

<p>Phishing and spam (A)</p> Signup and view all the answers

What feature can IT staff use to implement recommendations on a Windows host?

<p>Local Security Policy (B)</p> Signup and view all the answers

Which of the following is NOT a function associated with the Local Security Policy?

<p>Managing software updates (D)</p> Signup and view all the answers

In which category can IT staff learn more about security policy?

<p>Security Policy Categories (A)</p> Signup and view all the answers

What is a key component that a good security policy should specify?

<p>Minimum requirements for passwords (B)</p> Signup and view all the answers

Which of the following roles is responsible for using Local Security Policy on a Windows host?

<p>IT Staff (A)</p> Signup and view all the answers

Which aspect is NOT typically included in a good security policy?

<p>The budget for network upgrades (D)</p> Signup and view all the answers

What can be customized using the Local Security Policy feature?

<p>User account control settings (D)</p> Signup and view all the answers

How should remote users access the network according to a good security policy?

<p>By following specified guidelines (B)</p> Signup and view all the answers

Who should be authorized to access network resources as per a good security policy?

<p>Specified individuals as defined in the policy (C)</p> Signup and view all the answers

What should a security policy include regarding incidents?

<p>Guidelines on how incidents will be handled (A)</p> Signup and view all the answers

What is the primary role of Certificate Authorities (CAs) in relation to domains?

<p>To issue certificates that contain a public key. (C)</p> Signup and view all the answers

Why do Certificate Authorities sign the certificates they issue?

<p>To ensure the authenticity and integrity of the certificate. (D)</p> Signup and view all the answers

Which component is contained within the certificates issued by Certificate Authorities?

<p>A public key for secure communications. (A)</p> Signup and view all the answers

What does the presence of a signed certificate from a CA indicate?

<p>The CA has verified the owner's identity. (A)</p> Signup and view all the answers

What happens if a CA issues a certificate without proper validation?

<p>It may lead to security breaches due to unverified identity. (D)</p> Signup and view all the answers

What is a common practice among many home users regarding their wireless routers?

<p>Keeping the default passwords (A)</p> Signup and view all the answers

Why do some devices come with permissive settings?

<p>To facilitate ease of use for consumers (A)</p> Signup and view all the answers

What risk is associated with leaving wireless routers at default settings?

<p>Vulnerability to unauthorized access (C)</p> Signup and view all the answers

What is often sacrificed by home users for the sake of ease regarding wireless network security?

<p>Data privacy (C)</p> Signup and view all the answers

Which security practice is often overlooked by users for convenience?

<p>Changing default passwords (A)</p> Signup and view all the answers

What does AutoPlay provide in relation to new media?

<p>It offers additional controls and prompts user actions. (B)</p> Signup and view all the answers

Where can you configure the actions associated with specific media?

<p>In the AutoPlay window from Control Panel. (D)</p> Signup and view all the answers

Which of the following statements about AutoPlay is untrue?

<p>AutoPlay only works with audio files. (A)</p> Signup and view all the answers

What is NOT a function of the AutoPlay feature?

<p>Automatically updating software applications. (C)</p> Signup and view all the answers

Which component is used to access the AutoPlay configuration options?

<p>Control Panel (C)</p> Signup and view all the answers

Flashcards

Network Authentication Database

A database used by network devices for authenticating administrative users.

Email Security Appliance (ESA)

An appliance (device) that filters spam and suspicious emails from incoming mail.

Security Policy

A document outlining rules for accessing network resources.

Authorized Users

Identifies people allowed to use network resources.

Signup and view all the flashcards

Password Policy

A set of requirements for creating strong passwords.

Signup and view all the flashcards

Acceptable Use Policy

Details appropriate ways to use network resources.

Signup and view all the flashcards

Incident Response Plan

Describes how security incidents are handled.

Signup and view all the flashcards

Local Security Policy

This feature allows IT staff to manage security settings on Windows computers.

Signup and view all the flashcards

Security Policy Categories

Groups of security settings related to a specific area, like user accounts or network access.

Signup and view all the flashcards

Implementing Recommendations

The process of implementing changes to a system's security based on your security policies.

Signup and view all the flashcards

Local Security Policy (on Windows)

A specific type of security policy that applies to a single Windows computer.

Signup and view all the flashcards

Default Network Settings

Default passwords and open wireless authentication settings are often used by home users for simplicity, but pose a serious security risk.

Signup and view all the flashcards

Permissive Device Settings

Some devices come preconfigured with weak security settings, increasing vulnerability to attacks.

Signup and view all the flashcards

Certificate Authorities (CAs)

Organizations that issue digital certificates to websites, verifying their identity and trustworthiness.

Signup and view all the flashcards

Digital Certificate

A digital document that contains a website's public key and other information, signed by a Certificate Authority.

Signup and view all the flashcards

Domain Name

A unique string of characters that identifies a website or server.

Signup and view all the flashcards

Public Key

A unique, publicly available key used for encrypting data sent to a website.

Signup and view all the flashcards

Certificate Validation

The process of verifying the authenticity and integrity of a digital certificate.

Signup and view all the flashcards

AutoPlay

Automatic actions that can be set to respond to specific media types (like music or videos) when they're inserted or opened. This helps streamline workflows and provide context-based actions.

Signup and view all the flashcards

AutoPlay Settings

A feature that allows you to configure the actions associated with different media formats to automatically launch programs, open files, or take other actions.

Signup and view all the flashcards

AutoPlay Window

A window within the Control Panel where you can customize how your computer handles different media types when they're inserted or opened. This window allows you to set specific actions for each type of media.

Signup and view all the flashcards

Specific Media

Media types like music, videos, photos, and document files. Each media type can have a different action associated with it, like opening a program or displaying a preview.

Signup and view all the flashcards

Control Panel

A user interface element within the Control Panel that lets you manage and configure various system settings, including AutoPlay. It provides access to a wide array of options.

Signup and view all the flashcards

Study Notes

Module 13: Introduction

  • This chapter reviews attacks that threaten the security of computers and data.
  • An IT technician is responsible for data and computer security.
  • Understanding threats to physical equipment (servers, switches, wiring) and data threats (authorized access, theft, loss) is crucial for successful computer security.

Security Threats

  • Malware is the greatest and most common threat.
  • Types of malware include viruses, Trojan horses, adware, ransomware, rootkits, spyware, and worms.
  • Techniques to protect against malware include proper antivirus software, avoiding suspicious websites, and downloading software from trusted sources.
  • TCP/IP attacks also threaten networks.
  • Social engineering exploits human weaknesses.
  • Types include phishing, pretexting, baiting, and dumpster diving.
  • A security policy defines security objectives for an organization, including authorized access and network use. A good policy specifies acceptable network usage, password requirements, remote access procedures, and how security incidents are handled.
  • Host-based firewalls (e.g., Windows Defender) can be configured to control access to programs and ports.
  • Wireless security configurations are crucial to protect networked devices.

Malware

  • Malware is malicious software.
  • It's typically installed without user knowledge.
  • Malware actions include altering computer configuration, deleting files, corrupting drives, collecting information, or opening extra windows.
  • Cybercriminals use various methods, such as infected websites, outdated antivirus, or unsolicited emails, to install malware.
  • Different types of malware exist for various purposes (e.g., non-compliant/legacy systems are particularly vulnerable).

Viruses and Trojan Horses

  • Viruses are the first and most common type of malware. Propagation requires human action (e.g., opening an email attachment or USB drive).
  • Viruses alter, corrupt, or delete files. They can also capture information and spread by exploiting email accounts.
  • A Trojan horse appears useful, but hides malicious code. Often contained in free programs.
  • Various types of Trojan horses exist (remote-access, destructive, proxy, FTP, etc.).

Other Malware Types

  • Adware: Displays unwanted advertisements (pop-ups, toolbars, redirects).
  • Ransomware: Encrypts files and demands payment for decryption.
  • Rootkits: Gain administrator-level access to computers via concealed methods.
  • Spyware: Gathers user information without consent, ranging from low to high threat. May steal passwords, email addresses, or financial details.
  • Worms: Self-replicating programs that spread via networks and exploit vulnerabilities.

Preventing Malware

  • Identifying and researching malware symptoms.
  • Quarantining infected systems.
  • Disabling system restore (in Windows).
  • Remediating infected systems.
  • Scheduling scans and running updates.
  • Enabling system restore and creating restore points.
  • Educating users is vital for preventative measures.

Anti-Malware

  • Anti-malware programs continuously scan for known malware patterns. They can also use heuristic techniques to detect malicious behavior.
  • Running a scan when the machine initializes ensures malware is detected as early as possible.
  • Anti-malware checks for signs of malware, such as malicious file types, while in the background.
  • Multiple anti-malware programs may negatively impact processing speed.

Network Attacks

  • Attackers often use reconnaissance techniques to gather information about a target (e.g,. Google searches, WHOIS data).
  • Examples of attacks include ping sweeps, port scans, vulnerability scans, and exploit tools.
  • TCP/IP attacks like Denial of Service (DoS) can overwhelm target devices by flooding requests.
  • A variant of DoS, DDoS, exploits multiple compromised hosts to overwhelm a target.
  • Other attacks, such as DNS poisoning, trick computers into accessing malicious servers. Man-in- the-middle attacks intercept communications, and replay attacks reuse stolen packets.

Zero-Day Attacks

  • Zero-day is the day an unknown vulnerability is found.
  • Zero-hour is the moment the exploit is discovered.
  • A zero-day vulnerability exists between the discovery and the development of a solution.

Protecting Against Network Attacks

  • The goal is a layered approach to security (e.g., VPNs for remote access; ASA and IPS (intrusion prevention systems) to monitor and potentially block traffic; AAA servers for credential management).
  • Security must also be enforced on mobile devices and the network.

Social Engineering

  • Cybercriminals employ social engineering to trick individuals.

  • Baiting involves enticing victims with potentially dangerous files or gifts.

  • Impersonation is pretending to be an authorized entity.

  • Tailgating is gaining access after an authorized user.

  • Shoulder surfing is observing a user's actions to acquire login credentials.

  • Dumpster diving is searching through trash for discarded sensitive information.

  • Pretexting is extracting private information based on a false pretense.

  • Phishing is sending an email pretending to be from a trusted entity.

Security Procedures and Policies

  • A security policy helps ensure security for a network, the data, and their components.
  • Policies typically address identification and authentication, acceptable use, remote access, network maintenance, and incident handling.
  • Organizations may define policies based on their asset types and level of security required.
  • Securing physical equipment is as important as securing digital information (e.g. employee badges, mantraps, secure server rooms, and proper locking mechanisms).

Protecting Data

  • Data is a valuable organizational asset.
  • It includes research, development, sales, finances, human resources, legal, employee, contractor, and customer data.
  • Data loss or corruption presents risks such as legal action, financial penalties, reputational damage, and loss of competitive advantage.
  • Several strategies help protect data, for example, data backups on removable media or cloud storage and encryption mechanisms.

File and Folder Permissions

  • Permissions control file access for individuals and groups, limiting access.
  • Understanding data location and modifications determines permission propagation.
  • Least privilege: Users should have only the necessary access.
  • Folder redirection allows users to access files on a network regardless of their location.

File and Folder Encryption

  • Encryption protects data confidentiality.
  • Windows uses the Encrypting File System (EFS) for file encryption.

Windows BitLocker and BitLocker to Go

  • BitLocker encrypts entire drives.
  • BitLocker to Go allows encryption of removable drives.
  • A TPM chip is often used with BitLocker.

Security Maintenance

  • Devices and systems may have default security settings. Restrictive settings improve security, but can be harder to administer.
  • AutoPlay should be disabled to prevent malicious script execution, especially when using floppy disks, CDs, or USB drives.
  • Security patches for operating systems are crucial for preventing and mitigating existing vulnerabilities.

Wireless Security

  • Wireless networks are vulnerable to attack due to radio transmissions. Security measures include using robust authentication methods, securing the wireless access point (like changing the name and password), and regularly updating firmware on the device.

Firewall Configurations

  • Firewalls control internet traffic, and their configurations include packet filtering, stateful inspection, and proxy.

Port Forwarding and Port Triggering

  • Using port forwarding, specific network traffic for applications will be routed to a specific device.
  • When traffic reaches a router, port forwarding determines the destination.
  • Port triggering temporarily forwards data to inbound ports when an outbound request is made to a specific type of program or device.

Universal Plug and Play (UPnP)

  • UPnP has security vulnerabilities.
  • Disabling UPnP adds an additional level of security.

Windows Firewall

  • Software firewalls (e.g., Windows Defender) set inbound and outbound rules.
  • Firewalls use rules to control traffic (e.g., port numbers).
  • Advanced Security settings allow for more precise control of incoming and outgoing traffic.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on network security policies and the functions of Email Security Appliances (ESA). This quiz covers user authentication, security policy components, and more related to network device security. Perfect for IT professionals looking to reinforce their understanding of these critical topics.

More Like This

Network Security: Email and DNS
45 questions
E-postprotokoll och säkerhet
38 questions
Use Quizgecko on...
Browser
Browser