all Flashcards

(40 cards)

1
Q

The cybersecurity countermeasure technologies include cloud based technologies . Name the three types of cloud based services which could be implemented for technological safeguard

A

software as a serivce (SaaS)
infrastructure as a service (IaaS)
virtual security appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

describe one malware that requires users intervention

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the three principles of security

A

confidentiality , availability , integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

describe one malware that does not require user participation

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a malware silently carries out malicious operation while peter plays an online game . what malware is that?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

describe four types of spoofing attacks

A

mac spoofing
ip spoofing
arp spoofing
dns spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

which malware modifies the operating system to create a backdoor to allow attackers to use the backdoor to access the computer remotely

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the security protocol used in wifi to replace WEP is

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

explain one software that enables a criminal to obtain information about a user computer activities

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the three objectives for implementation within the cybersecurity policies and procedures

A

standards
guidelines
the procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are three states of data

A

data in transit
data at rest
data in process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

peter comes across a suspicious email from a popular retail store asking him to click a link to claim a prize . what is the possible malware that is accociated with this scenario

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

four triggers that could awaken a malicious program like logic bomb are

A

date
time
programs
delete user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the three security services for controlling access

A

authentication
authorization
accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what workforce framework categorizes cybersecurity work into seven categories.

A

operate and Maintain
protect and Defend
investigate
collect and operate
analyze
oversight and development
securely provision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the three classification of hackers?

A

white hat , black hat, grey hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

explain two characteristics of malware in computer systems

A

disrupt
gain access

18
Q

what tools criminals use to capture data streams over a network?

A

packet-sniffing

19
Q

name one computer hardware component that logic bomb can destroy.
logic bomb can destroy computer hardware component such as cooling fans , CPU,power supplies , hard drives and _______________

20
Q

state two type of access control

A

physical
logical

21
Q

a computer attack that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor is known as _____________

A

Zero-Day attack

22
Q

peter provided his bank account information to a stranger who pretended as a government official to confirm his identity . what is the deception technique that the stranger is using.

23
Q

what is another term for piggybacking

24
Q

when data goes beyond the limits of a buffer , it is known as _______

A

buffer overflow

25
describe one malware that attacks a computer system or the data it contains , captive until the target makes a payment
ransomware
26
provide one method of creating ciphertext
any1 transposition substitution one-time pad
27
list two types of encryption algorithm and provide one encryption standard for each class
symmetric AES asymmetric ECC
28
list two types of encryption algorithm
symmetric asymmetric
29
list two protocols that uses asymmetric key algorithms
IKE SSL SSH PGP
30
describe virtual private network
private network uses a public network/internet create secure channel
31
name three types of authentication methods
what you know what you have who you are
32
define three authorization in access control
controls what a user can cannot do after successful authentication
33
provide three types of security controls
deterrent detective corrective
34
state three different between symmetric and asymmetric
s. more problematic harder to manage a. more secure
35
peter met a lady in the bar who tired to gather information on his company participation in a new government project. describe the non technical deception technique used in this scenario
social engineering
36
describe data masking
1.technology that secures data 2.replacing sensitive information with a non-sensitive looks like the original 3.non sensitive looks like the original
37
provide two data masking techniques
substitution shuffling
38
what is steganography
conceals data/message in another file
39
describe three components involved in steganography
embedded data cover text stego-key
40
what is data obfuscation
harder to understand use and practice of data masking and steganography