Chapter 1 Flashcards

Combo: Quiz 1 plus Book End of Chapter Questions

1
Q

One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government.

(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Script kiddies

A

Individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smart phones give the owner of the device the ability to download security updates.

(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To mitigate risk is the attempt to address risk by making the risk less serious.

(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the security principle of simplicity.

A

As much as possible, a secure system should be simple for those on the inside to understand and use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?

A

Love bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The CompTIA Security+ certification is a vendor-neutral credential.

(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the measures for achieving availability?

A

redundancy, fault tolerance, patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proxies are “devices” that are strictly software-only.

(T/F)

A

Falase

A proxy server is a device which can be either software or hardware based. It intercepts messages entering and leaving the network, and makes outgoing requests on behalf of users. Its primary function is enhancing web surfing performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A rootkit can hide its presence, but not the presence of other malware.

(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

d. MisconfigurationsIan recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs. Which of these generally recognized security positions has Ian been offered?

a. Security administrator
b. Security technician
c. Security officer
d. Security manager

A

a. Security administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation?

a. Large number of vulnerabilities
b. End-of-life systems
c. Lack of vendor support
d. Misconfigurations

A

d. Misconfigurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tatyana is discussing with her supervisor potential reasons why a recent attack was successful against one of their systems. Which of the following configuration issues would NOT covered?

a. Default configurations
b. Weak configurations
c. Vulnerable business processes
d. Misconfigurations

A

c. Vulnerable business processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a race condition?

a. When a vulnerability is discovered and there is a race to see if it can be patched before it is exploited by attackers.
b. When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.
c. When an attack finishes its operation before antivirus can complete its work.
d. When a software update is distributed prior to a vulnerability being discovered.

A

b. When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which the following is NOT a reason why it is difficult to defend against today’s attackers?

a. Delay in security updating
b. Greater sophistication of defense tools
c. Increased speed of attacks
d. Simplicity of attack tools

A

b. Greater sophistication of defense tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is NOT true regarding security?

a. Security is a goal.
b. Security includes the necessary steps to protect from harm.
c. Security is a process.
d. Security is a war that must be won at all costs.

A

d. Security is a war that must be won at all costs.

17
Q

Adone is attempting to explain to his friend the relationship between security and convenience. Which of the following statements would he use?

a. “Security and convenience are not related.”
b. “Convenience always outweighs security.”
c. “Security and convenience are inversely proportional.”
d. “Whenever security and convenience intersect, security always wins.”

A

c. “Security and convenience are inversely proportional.”

18
Q

Which of the following ensures that only authorized parties can view protected information?

a. Authorization
b. Confidentiality
c. Availability
d. Integrity

A

b. Confidentiality

19
Q

Which of the following is NOT a successive layer in which information security is achieved?

a. Products
b. People
c. Procedures
d. Purposes

A

d. Purposes

20
Q

Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information _____.

a. on electronic digital devices and limited analog devices that can connect via the Internet or through a local area network.
b. through a long-term process that results in ultimate security.
c. using both open-sourced as well as supplier-sourced hardware and software that interacts appropriately with limited resources.
d. through products, people, and procedures on the devices that store, manipulate, and transmit the information.

A

d. through products, people, and procedures on the devices that store, manipulate, and transmit the information.

21
Q

Which of the following is an enterprise critical asset?

a. System software
b. Information
c. Outsourced computing services
d. Servers, routers, and power supplies

A

b. Information

22
Q

Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document?

a. Extinguish risk
b. Transfer risk
c. Mitigate risk
d. Avoid risk

A

a. Extinguish risk

23
Q

Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information?

a. Sarbanes-Oxley Act (Sarbox)
b. Financial and Personal Services Disclosure Act
c. Health Insurance Portability and Accountability Act (HIPAA)
d. Gramm-Leach-Bliley Act (GLBA)

A

d. Gramm-Leach-Bliley Act (GLBA)

24
Q

Why do cyberterrorists target power plants, air traffic control centers, and water systems?

a. These targets are government-regulated and any successful attack would be considered a major victory.
b. These targets have notoriously weak security and are easy to penetrate.
c. They can cause significant disruption by destroying only a few targets.
d. The targets are privately owned and cannot afford high levels of security.

A

c. They can cause significant disruption by destroying only a few targets.

25
Q

Which tool is most commonly associated with nation state threat actors?

a. Closed-Source Resistant and Recurrent Malware (CSRRM)
b. Advanced Persistent Threat (APT)
c. Unlimited Harvest and Secure Attack (UHSA)
d. Network Spider and Worm Threat (NSAWT)

A

b. Advanced Persistent Threat (APT)

26
Q

An organization that practices purchasing products from different vendors is demonstrating which security principle?

a. Obscurity
b. Diversity
c. Limiting
d. Layering

A

b. Diversity

27
Q

What is an objective of state-sponsored attackers?

a. To right a perceived wrong
b. To amass fortune over of fame
c. To spy on citizens
d. To sell vulnerabilities to the highest bidder

A

c. To spy on citizens

28
Q

Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use?

a. Obscurity
b. Layering
c. Diversity
d. Limiting

A

a. Obscurity

29
Q

What are industry-standard frameworks and reference architectures that are required by external agencies known as?

a. Compulsory
b. Mandatory
c. Required
d. Regulatory

A

d. Regulatory

30
Q

What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?

a. Cyberterrorists
b. Competitors
c. Brokers
d. Resource managers

A

c. Brokers