Computer Security Questions and Answers:: 1:: What Is A Firewall?
Computer Security Questions and Answers:: 1:: What Is A Firewall?
1 :: What is a Firewall?
A Firewall is software that blocks unauthorized users from connecting to your computer. All
computers at Bank Street are protected by a firewall which is monitored and updated by CIS.
2 :: What is Spyware?
Spyware is software that is installed without your knowledge. The purpose of Spyware is to
monitor your computing activities and report this data back to companies for marketing
purposes. Besides being an invasion of privacy, this software can cause serious performance
issues.
3 :: How can I avoid computer viruses?
Most viruses travel through email or internet downloads. Never open attachments from unknown
senders and be very cautious when downloading software from internet sources.
4 :: What is computer impersonation?
Impersonation is the ability of a thread to execute in a security context other than from that of the
process that owns the thread. This enables a server to act on behalf of a client to access its own
objects.
5 :: What are privileges (user rights)?
A privilege is used to control access to a service or object more strictly than is normal with
discretionary access control.
11 :: I have been hearing a lot about firewalls, but I am not sure what it is or if I need
it. Can you help?
A firewall is basically a software program that allows you full access to the Internet and/or your
network, while restricting access to your computer system from outside intrusions.
Internet users are extremely vulnerable to hackers, especially if you have cable or ADSL access
to
the
Internet.
You
definitely
need
to
protect
your
computer
system.
Once you install a firewall, you'll be amazed at how many attempts to access your computer are
blocked
by
your
firewall.
Hackers can directly access your computer system by installing programs such as a key logger
that can read every keystroke you make. This information is recorded and sent back to the
hacker. Private information such as passwords and credit card numbers can easily be stolen.
A key logger is a small software program that quietly runs in the background. As these programs
quite often run in DOS, you will most-likely never realize it's running. However, you can see if a
key logger is running by pressing 'control' - 'alt' - 'delete' on your keyboard. This will launch a
window that contains a list of all the programs currently running on your system. Review the list
and
watch
for
programs
you
don't
recognize.
If you really want to keep your computer safe, I recommend
1)
Purchase
a
good
virus
program
and
keep
2)
Purchase
a
good
firewall
program
and
keep
3) Purchase a program like Pest Patrol and keep it updated
the
it
it
following:
updated
updated
Use the out put from any network security scanner, which ever network security scanner is used
by the interviewer and ask the interviewee to interpret the results. What does the scanner output
say, how would they use the information, and how would they break the information down for the
system administrators? This lets the interviewer determine how well the interviewee can interpret
and voice back the results of a security scan, and how well they can communicate. The
interviewer should already have worked with the scanner, its output, and should be able to work
with the interviewee to determine the finer points of the data presented.
SID
group
security
ID
Revision
build
Access-Control
contain
descriptors
authority
level
Lists
(ACLs).
Each
ACE
contains
the
following
information:
* A SID, that identifies the trustee. A trustee can be a user account, group account, or a logon
account
for
a
program
such
as
a
Windows
NT
service.
*
An
access
mask
specifying
access
rights
controlled
by
the
ACE.
* Flags that indicates the type of ACE and flags that determine whether other objects or
containers can inherit the ACE from the primary object to which the ACL is attached.
21 :: Are there any known problems with the screen saver / screen lock program?
Yes. In version 3.5 and 3.51, if the administrator decide to kick a user off, then the admin has a
small time window to see the content of the users current screen and desktop.
22 :: Can my page file hold sensitive data?
It can. Memory pages are swapped or paged to disk when an application needs physical
memory. Even though the page file (see Control Panel->System->Performance->Virtual
Memory) is not accessible while the system is running, it can be accessed by, for example,
booting
another
OS.
There is a registry key that can be created so that the memory manager clears the page file
when
the
system
goes
down:
HKLM\SYSTEM\CurrentControlSet\Control\Session
Manager\MemoryManagement\ClearPageFileAtShutdown:
Note that the clearing of the page file only is done when the system is brought down in a
controlled fashion. If the machine is just switched off or brought down in any other brute way, of
course no clearing will be performed.
23 :: Administrator account
Microsoft recommends that you changes the name of the administrator account so that outsiders
cannot
guess
the
name.
This is of course just one of the things you can do. But unlike what some Microsoft employees
believe, security does not stop there. Just changing name of administrator is to trying to protect
yourself by the lowest level of security there is, security by obscurity .
It is possible to obtain the new name of the administrator by using the command
nbtstat
-A
<ip-address>
when the administrator is logged in on the console.
25 :: What is Authenticode?
Authenticode is a way to ensure users that code they download from the net has not been
tampered with and gives the code an etched in ID of the software publisher. Microsoft is pushing
this as a new way of getting better security into software distribution over the net.
Do you have any collection of Interview Questions and interested to share with us!!
Please send that collection to i q@ G l oba l G ui de l i ne. Com along with the category and sub
category information
26 :: What servers have TCP ports opened on my NT system? Or: Is netstat broken?
Normally, the netstat program should report information on the status of the networking
connections, routing information, etc. With the option -A or -a, it should list all TCP and UDP
available connections and servers that are accepting connection. On Windows NT, even though
the
documentation
states
otherwise,
this
is
not
the
case.
There are no simple way to check what services that are running with TCP ports opened to
accept connections. Currently the only way to get some information about this is to use a port
scanner program and test through each TCP port on the NT machine. This is not a fool proof
way
of
dealing
with
the
problem.
This is a serious problem if you plan to have NT based computers in the firewall environment.
You cannot easily hardened them to become bastion hosts, since you are not confident what
types
of
network
services
that
might
be
reachable
from
the
outside.
It is a confirmed bug in Windows NT 3.5, 3.51 and 4.0. I do not expect Microsoft to fix it soon
enough.
Update:
netstat.exe is fixed as of NT4 SP3, but it still shows some strange behavior. For example, on a
moderately loaded machine, you can find numerous duplicates of open connections. Why is
that?
of
the
parameters
are
LogAnonymous,
LogFileAccess,
LogNonAnonymous.
See Microsoft's articles on how to turn on * Better logging in the FTP server. * Accessing the root
directory. * Access Rights for Anonymous Users of FTP Server * LogAnonymous Does Not
Always Make an Entry in System Log
29 :: What is Shutdown.exe?
There are a bug in the utility shutdown.exe that are part of the NT Resource Kit. That bug
disables
the
screen
saver
on
a
remote
machine.
It is confirmed to be a problem on 3.51 systems.
ODBC
Add
Tracing
usage
hooks
connections
ODBC
Any call with indirections, such as calls to ODBC data sources, are possible to intercept by
attaching to pre-made hooks. By tracing ODBC connections, which is a completely legitime thing
to do during software development, you can get access to sensitive data, such as user name for
the connected database.
31 :: By default, all auditing in Windows NT is turned off. You have to manually turn
on auditing on whatever object you want audited. First off, you should have a
policy for
By default, all auditing in Windows NT is turned off. You have to manually turn on auditing on
whatever object you want audited. First off, you should have a policy for
*
*
what
to
for
log
(user
how
behaviors,
long
changes
to
on
files
keep
or
the
processes)
logs
* whether or not you should turn on auditing on all your machines, or if you only turn on logging
on
the
servers
Then you should configure the auditing. You should also remember that it is hard to have a good
use of auditing (or any use at all), if you don't have good tools and a good suite of policies on
how
to
handle
the
logs.
You have to remember that cranking up auditing might give you performance degradation. The
trick is to find the balance between how much to log without getting problem.
Remember that Windows NT saves the logs locally on disk. If someone can take control over the
machine, it is quite likely that the logs might be manipulated as well. A better solution might be to
send away the logs to one or more protected, centralized log-servers.
32 :: What is CryptoAPI?
CryptoAPI is a set of encryption APIs that allow developers to develop applications that work
securely
over
non-secure
networks,
such
as
the
Internet.
CryptoAPI is shipped with NT version 4 and the Internet Explorer 3.0. Version 2.0 of CryptoAPI
comes with SP3 for NT4.
aggregator such as Google News can help you search for breaking news, for instance about a
new virus outbreak)