CPE 046 Flashcards

(60 cards)

1
Q

ıs a multıtaskıng operatıng
system used on most Cısco routers
and swıtches.

A

IOS (Internetwork Operatıng
System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IOS

A

(Internetwork Operatıng
System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ıs used to
confıgure routıng, swıtchıng,
ınternetworkıng and other features
supported by a Cısco devıce.

A

IOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

thıs type of access ıs usually used to confıgure newly
acquıred devıces. These devıces usually don’t have an IP address confıgured,
and therefore cannot be accessed through the network.

A

Console access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

thıs type of access used to be a common way to access network devıces. ________ ıs a termınal emulatıon program that enables you to access IOS through the network and confıgure the devıce remotely. Uses
TCP port 23

A

Telnet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

– lıke Telnet, thıs access type enables you to confıgure devıces
remotely, but ıt adds an extra layer of securıty by encryptıng all
communıcatıons usıng publıc-key cryptography. SSH uses well known TCP
port 22.

A

SSH access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IOS Command Hierarchy

A

User EXEC COMMANDS
PRIVILEGED EXEC COMMANDS
Global Configuration Commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Configuration Mode

A

Interface
Subinterface
Controller
Map-list
Map-class
line
router
ipx-router
route-map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is the practice of protecting systems,
networks, and programs from digital attacks.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Pillars of Cybersecurity

A

Best Practices
Policies & Procedures
Products & Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You set up a new network for a growing company, but you don’t
follow all of the recommended cybersecurity best practices. While you may have invested in robust security products, they can be easily subverted by _________________

A

failure to follow best practices.

or

Best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples: Acceptable use policies, employee training.

Failure Example: Deploying a content filter without training employees, leading to risky behavior.

A

Policies & Procedures:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples: Firewalls, antivirus software, maintenance subscriptions.

Failure Example: Skipping security service licenses, leaving systems vulnerable to zero-day attacks.

A

Products & Services:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples: Locking doors (analogous to securing networks), using strong passwords, updating firmware.

Failure Example: Installing robust security tools but using weak passcodes (e.g., “1234”).

A

Best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIA TRIAD

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confidential information is kept secret to prevent: identity theft,
compromised accounts and systems, legal concerns, damage to
reputation, and other severe consequences.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MFA

A

multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data is one of the most valuable assets a company can have, but it is not static. It can be transferred to other systems, altered, and
updated multiple times.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____________ guarantees that data is accurate, complete, and consistent.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It covers data in storage, during processing, and in transit. Without data integrity, loss, corruption, or compromise can cause significant damage and financial loss for both businesses and customers.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The two main types of data integrity are:

A

Physical data integrity
Logical data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is the collection of actions and fail-safes that
protect the physical systems that store and process the data.

A

Physical data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

are the checks and protocols that protect data
from human error and hackers. These confirm that data is correct and
accurate as it’s used in different ways within an organization

A

Logical data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

means that authorized users have immediate and
reliable access to their data. This includes granting access to
authorized users with passwords and security questions.

A

Data availability or Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Some of the most fundamental threats to availability are non- malicious, including:
hardware failures, unscheduled software downtime, network bandwidth issues.
26
NIST(National Institute of Standards and Technology) Cybersecurity Framework
Identity Protect Detect Respond Recover
27
what processes and assets need protection?
Identity
28
Implement appropriate safeguards to ensure protection of the enterprise's assets
Protect
29
Implement appropriate mechanisms to identify the occurrence of cybersecurity incidents
Detect
30
Develop Techniques to contain the impacts of cybersecurity events
Respond
31
Implement the appropriate processes to restore capabillities and service impaired due to cybersecurity events
Recover
32
Weak security policies can lead to physical threats, tampering, or the theft of hardware.
Hardware Threats
33
is the art of unlocking the lock by analyzing and manipulating the components of the lock device, without an original key.
Lock Picking
34
Threats and Breaches
Hardware Threats Data Threats Data Leaks & Data Breaches Data Dumps Dumpster Diving Software Threats
35
* Unpatched systems, misconfigured firewalls, weak cybersecurity, and weak physical security are just a few ways that data threats occur * Data Leaks & Data Breaches. * Data Dumps * Dumpster Diving
Data Threats
36
are the accidental exposure of confidential or sensitive data through a security vulnerability.
Data leaks
37
are when a data leak is caused intentionally by a cybercriminal. These occur when social engineering or phishing attacks trick employees into leaking sensitive credentials or information.
Data breaches
38
are when cybercriminals dump (release) stolen data onto the dark web for monetary gain.
Data Dumps
39
is the act of physically searching through a literal dumpster to find something valuable.
Dumpster diving
40
Tech companies require ______________________ as a normal part of business because these can be stolen from the trash to harvest data that can be used for identity theft and data breaches, or the data could be sold to hackers, or a company's competitors.
document shredding and device destruction
41
include theft, exploits, and malware.
Software Threats
42
is the unauthorized copy or use of copyright-protected software. This includes pirating software and counterfeiting activation codes.
Software or license theft
43
are pieces of code that use vulnerabilities in hardware or software to get into a system.
Exploits
44
Malware-infected websites use exploits to automatically download malware to a system. This is called _______
drive by download.
45
Malware
Malicious Software
46
is a general term for software designed to compromise computer systems. Malware can cause system slowdowns, odd requests, browser misdirection, popup ads.
Malware
47
It can also steal data, record everything you do with or near your device, spam your contacts with infected links, and connect your computer to a network of hijacked computers that are remotely controlled (known as a ______).
Malware botnet
48
Malware can come from:
* attachments * sketchy websites * file downloads * infected USB drives * links in emails, ads, social media, torrents, and even text messages
49
Malware Types
Program viruses Macro viruses Stealth viruses Polymorphic viruses Worms Trojans Spyware Adware Ransomware
50
are bits of code that insert themselves into another program.
Program viruses
51
affect Microsoft Office files via the macros they use to automate tasks.
Macro viruses
52
copy themselves to different locations to avoid antivirus scans.
Stealth viruses
53
change their characteristics to get around cybersecurity defenses. 97% of all malware uses polymorphic viruses.
Polymorphic viruses
54
start themselves after identifying system weaknesses. They don’t rely on apps or files. Unlike other viruses, worms can be controlled remotely. A computer worm replicating itself aims to make copies that can infect other computers. While most malware is isolated to the infected device, worm viruses are designed to spread to other devices.
Worms
55
trick you into installing legitimate-seeming software that includes harmful malware.
Trojans
56
collects personal data, login credentials, credit card information, online activity, and can record using a device’s camera or microphone.
Spyware
57
is software coded into online ads that records your personal data, website visits, and keystrokes to send you personalized ads. Both adware and spyware can be legitimate or malicious.
Adware
58
locks a system, encrypts its files, and displays a ransom demand. To get the encryption key you must pay the ransom, or you can regain access by doing a full system restore from a backup.
Ransomware
59
EICAR
The European Institute for Computer Antivirus Research
60
The European Institute for Computer Antivirus Research (EICAR) has developed a test virus to test your antivirus solution. This script is an inert text file. The binary pattern is included in the virus pattern file from most antivirus vendors. The test virus is not a virus and does not contain any program code.
Sample Virus