Block 5 Flashcards

(40 cards)

1
Q

What type of attacks often involving multiple devices usually using a botnet?

A

DDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Blank is an aggregation of computers turning them into robots.

A

BOTNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

According to the STRIVE model, what threat allows someone to perform an action they are not authorized to do?

A

elevation of privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the definition of data diddling?

A

altering data entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of social engineering targets specific individuals utilizing messaging that appeals to that person?

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social engineering is what kind of confidence trick?

A

low technology and non-technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attacking involves leading infected media in a public place in order to trigger an attack?

A

bait

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of attack is a specific form of phishing targeting high-value individuals?

A

whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blank refers to software or website scripts written to cause undesired effects.

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of virus executes when the system is booted?

A

boot sector virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ransomware will ______ an entire system until a ransom is paid.

A

encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of malware acts normal and useful until a predefined event occurs?

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When moving data offsite, it’s important to ensure how ___ is securing the data.

A

third party

Ensuring data security when transferring data offsite is crucial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the single biggest drawback to single sign-on services?

A

attackers have access to multiple servers

This highlights the security vulnerability associated with single sign-on systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 4 types of network access control?

A
  • agent less
  • agent based
  • dissolvable
  • permanent

Understanding the types of access control helps in implementing security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Of the 4 access controls, which one runs a check but does not remain installed?

A

dissolvable

Dissolvable access controls are temporary and are removed after the session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What were the 3 A’s of the triple A protocol?

A
  • accounting
  • authentication
  • authorization

These are essential components of security protocols.

18
Q

Of the 3 triple A protocols, which one logs all resources a user consumes?

A

accounting

Accounting is crucial for tracking user activity.

19
Q

Injecting malicious code into web applications is what kind of attack?

A

cross-site scripting

This type of attack poses significant risks to web application security.

20
Q

What type of encryption is applied much faster than software encryption?

A

hardware

Hardware encryption is typically more efficient and secure.

21
Q

What type of encryption stores processors?

A

hardware security module

This module is essential for secure processing of cryptographic keys.

22
Q

What type of encryption module stores cryptographic keys?

A

trusted platform module

TPMs provide secure storage for cryptographic keys.

23
Q

Software-based firewalls are also known as what?

A
  • application firewall
  • host-based firewalls
  • personal firewall

These firewalls offer protection at the application layer.

24
Q

A packet filtering firewall can filter traffic based on source or destination what?

A
  • port
  • IP address

Packet filtering is a fundamental feature of firewalls.

25
What security zone is designated for visitors?
guest ## Footnote Guest zones provide limited access to protect the main network.
26
What category would be used for network functionality stopped by high network traffic?
category 4 ## Footnote Traffic congestion can significantly impact network performance.
27
Which category is used if you cannot determine the cause or event of an incident?
category 8 ## Footnote This category addresses incidents with unclear origins.
28
In what phase of the incident process would you address lessons learned, root cause, and other problems?
post-incident analysis ## Footnote This phase is critical for improving future incident response.
29
What information is typically requested during an investigation?
* antivirus logs * system log ## Footnote These logs are essential for understanding the incident.
30
How long do you have to determine if an incident meets operational reporting requirements?
1 hour ## Footnote Timely reporting is critical for incident management.
31
Cyber hygiene refers to what?
practices and steps that maintain system health and improve online security ## Footnote Good cyber hygiene is vital for preventing security breaches.
32
A baseline is a measure of a system's current state of ____.
system readiness ## Footnote Baselines help in assessing system performance.
33
What is a baseline deviation?
change from original value ## Footnote Deviations can indicate potential issues in system performance.
34
What are the direct 3 benefits of configuration management?
* uptime and site reliability * disaster recovery * scalability ## Footnote Effective configuration management enhances overall system performance.
35
What is the last step in a disaster recovery plan?
testing ## Footnote Testing ensures that the recovery plan is effective.
36
Compuscc is designed for protection of what 3 goals?
* confidentiality * integrity * availability ## Footnote These goals are fundamental to information security.
37
Tempest governs red and black separation. Which side is red and which side is black?
* red is plain text * black is ciphertext ## Footnote Red and black separation is crucial for secure communications.
38
What is one of the easiest ways for adversaries to gain information about military ops?
social media ## Footnote Social media can inadvertently expose sensitive information.
39
____ is the science of trying to break a coding system.
cryptanalysis ## Footnote Cryptanalysis is essential for assessing the strength of cryptographic systems.
40
____ is the science of creating a coding system for encryption and decryption.
cryptography ## Footnote Cryptography is fundamental to secure communications.