Chapter 8 Flashcards

1
Q

The knowledge and the attention shown by users with physical, logical, and administrative controls

A

Security Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HUMINT

A

Human Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data gathered by talking to people

A

Human Intelligence (HUMINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSINT

A

Open Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information collected from publicly available sources

A

Open Source Intelligence (OSINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data about data

A

Metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Measurement and signature data from sensors

A

Measurement and Signature Intelligence (MASINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data gathered by intercepting signals between people or systems

A

Signals Intelligence (SIGINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intelligence about equipment, technology, and weapons

A

Technology Intelligence (TECHINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dara about the financial dealings and transactions of companies and individuals

A

Financial Intelligence (FININT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intelligence gathered from computer syustems and networks

A

Cyber Intelligence/Digital Network Intelligence (CYBINT/DNINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technique that relies on the willingness of people to help others, particularly when the target is faces with someone that appears to be in distress, someone that is intimidating, or someone that we would normally expect to see in a given situation

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When attackers use information they’ve gathered to assume the guise of a manager, customer, reporter, co-worker’s family member, or other trusted person. Attackers create a fake identity and a believable scenario that convinces their targets to give up sensitive information or perform actions they wouldn’t normally do for strangers

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A social engineering technique in which an attacker uses electronic communications such as email, texting, or phone calls to collect the target’s personal information or install malware on their system, often by convincing the target to click a malicious link

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

aka piggybacking

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The act of following someone through an access control point, such as secure door, instead of using the credentials, badge, or key normally needed to enter

A

Tailgating

17
Q

Any application that makes any unauthorized changes to a device

A

Malware

18
Q

A policy that sensitive information is not to be left out on a desk when it is to be unattended for any significant period of time

A

Clean desk