Exam 2 Flashcards

1
Q

an attack made before awareness of repair of vulnerabilities are discovered

A

Zero Day Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

taking advantage of vulnerabilities

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware that stops users from access unless certain demands are met

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Programming code disguised as something else that corrupts an infected computer

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Harmful program that resides in computers’ active memory and duplicates itself

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Seemingly harmless program that hides malicious code & tricks users to open it

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Combines features of virus, worm, Trojan horse, and other malicious code

A

Blended Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unsolicited email sent to large numbers of people

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack that takes over computers via the Internet flooding a target site with demands for data, etc.

A

Distributed Denial of Service(DDOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Set of programs enabling its users to gain administrator-level access to a computer without consent or knowledge

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intruder gains access to a network and stays undetected intending to steal data over long period

A

Advanced Persistent Threat(APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fraudulently using email to try to get the recipient to reveal personal data

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a targeted version of phishing

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a version of phishing using voicemail

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a version of phishing using SMS messaging

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Deployment of malware that steals data from organizations like govt agencies, military contractors, political organizations, or manufacturing firms

A

Cyberespionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Intimidation of a govt or civilian population by using IT to disable critical infrastructure

A

Cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Federal agency created to provide a “safe, more secure America”. Contains the Office of Cybersecurity and Communications.

A

Department of Homeland Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Addresses fraud and related activities in association with computers

A

Computer Fraud and Abuse Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Addresses false claims regarding unauthorized use of credit cards

A

Fraud and Related Activity in Connection with Access Devices Statute(FRACADS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Unlawful access to stored communication to obtain, alter, or prevent authorized access to a wire or electronic communication while in storage

A

Stored Wire and Electronic Communications and Transactional Records Access Statutes(SWECTRA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Defined cyberterrorism and associated penalties. This act expired in 2020.

A

USA Patriot Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Part of the CIA Security Triad and ensures only those individuals with proper authority can access sensitive data

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Part of the CIA Security Triad and ensures data can only be changed by authorized users

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Part of the CIA Security Triad and ensures data can be accessed when and where needed

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Process of assessing security-related risks to computers & networks from internal & external threats. Identifies biggest threats and helps focus efforts on fixing said threats.

A

Risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Documented process for recovering an organization’s business IS assets, including hardware, software, data, networks, facilities.

A

Disaster Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Defines security requirements and controls, sanctions needed to meet them: what needs to be done, not how

A

Security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Provides a comprehensive display of all key performance indicators related to security defenses including threats, exposures, compliance, alerts

A

Security Dashboard Software

30
Q

Software and/or hardware that stands guard between an internal network and the Internet

A

Firewall

31
Q

Networking device connecting multiple networks transmitting data packets between them. Each of these devices is secure w/passphrase and has a unique media access control(MAC) for each device.

A

Router

32
Q

Intermediary between web browser and another server on the Internet

A

Proxy Server

33
Q

Enables remote users to remotely yet securely access organization’s resources. Also hides IP address.

A

Virtual Private Network (VPN)

34
Q

Gives users authority to only perform assigned responsibilities

A

User roles & accounts

35
Q

a method of securing data that protects data from unauthorized access

A

Data encryption

36
Q

Monitors, manages, & maintains computer & network security for other organizations. These are typically too costly for many organizations to have in-house

A

Managed Security Service Provider (MSSP)

37
Q

Combines elements of law & computer science to collect, examine, & preserve data. Preserves integrity of the data so it may be admissible as evidence in court.

A

Computer Forensics

38
Q

A combination of data privacy and communications privacy.

A

Information Privacy

39
Q

Ability to communicate with others without those communications being monitored

A

Communications Privacy

40
Q

ability to limit access to one’s personal data by others

A

Data Privacy

41
Q

Regulates the operations of credit reporting bureaus and is enforced by the Federal Trade Commision.

A

Fair Credit Reporting Act, 1970

42
Q

Protects records of financial institution customers from unauthorized scrutiny by the federal government. This act requires the government to provide written notice of intent to secure financial records, explanation, and which records. To access financial records permission, a judicial subpoena, or a search warrant is needed.

A

Right to Financial Privacy Act, 1978

43
Q

Bank deregulation that created one stop supermarkets

A

Gramm-Leach-Bliley Act, 1999

44
Q

Amended the Fair Credit Reporting Act allowing customers to obtain a free credit report annually.

A

Fair and Accurate Transaction Act, 2003

45
Q

mandatory guidelines for collection and disclosure of personal financial data. This includes the right to opt out of personal data being shared with third-parties

A

Financial Privacy Rule

46
Q

a set of rules that require documented plan for protecting data.

A

Safeguard Rules

47
Q

a set of rules that encourages organizations to implement safeguards against people accessing data without proper authority

A

Pretexting Rules

48
Q

Requires Healthcare organizations to standardize electronic transactions, codes, etc. Enabling them to fully digitalize medical records.

A

Health insurance Portability and Accountability Act(HIPAA)

49
Q

Bans the sale of electronic health records. Promotes use of audit trails and encryption. Provides rights of access for patients. Requires notification of data breaches.

A

American Recovery and Reinvestment Act

50
Q

Assigns rights to parents(or students at 18) to children’s educational records.

A

Family Educational Rights and Privacy Act(FERPA)

51
Q

Gives parents control over collection, use, & disclosure of their children’s personal info online

A

Children’s Online Privacy Protection Act(COPPA)

52
Q

Sets out requirements to protect minors from online harms. Covered platforms must act in the best interest of minors

A

Kid’s Online Safety Act(KOSA)

53
Q

Allows Law Enforcement to use wiretapping & electronic eavesdropping with a warrant

A

Wiretap Act(title 3 of omnibus crime control and safe streets act)

54
Q

Fair information practices that sets rules for collection, maintenance, use, and dissemination of personal data kept by federal agencies.

A

Privacy Act

55
Q

Procedures for surveillance and collection of foreign agencies on domestic soil. Allows surveillance without a court order within the US for up to a year unless surveillance will acquire the contents of any communication to which a US person is a party.

A

Foreign Intelligence Surveillance Act

56
Q

Requires telecommunications providers to hold data and respond to National Security Agency.

A

USA Freedom Act

57
Q

Identifies US intelligence-gathering agencies. Defines what info can be collected, retained, and disseminated.

A

Executive Order 12333

58
Q

Grants citizens the right to access certain information of the government upon request. Redactions are allowed for private, proprietary, or security information.

A

Freedom of Information Act

59
Q

Collection prep, review, and production of electronically stored info for use in criminal and civil actions

A

Electronic Discovery

60
Q

cookies and tracking software to gather data about customers.

A

Consumer Profiling

61
Q

A type of speech that is grossly improper or offensive

A

Indecency

62
Q

A form of speech that is disgusting to the senses, abhorent to morality or virtue, Designed to incite to lust of depravity.

A

Obscenity

63
Q

-An average person applying contemporary community standards would find the work, taken as a whole, appeals to prurient interest.

-Work must depict sexual conduct in a patently offensive manner specifically defined by law

-The work taken as a whole lacks SLAPP value(Serious, Literary, Artistic, Political, Scientific)

A

Three-part Test

64
Q

Weaponizes the judicial system as a backdoor method of stifling political expression. Typically this is used with some kind of defamation claim.

A

Strategic Lawsuit Against Public Participation(SLAPP)

65
Q

Procedural motion to throw out a case. In this act the plaintiff must prove they could win on legitimate merits of the case. Whoever loses typically has to pay fees.

A

Anti-SLAPP or SLAPP-back Act (Strategic Lawsuit Against Public Participation)

66
Q

This act covers the transmission of indecent material via the internet. Fines go up to as high as 250,000 with a punishment of prison up to 2 years.

A

Communications Decency Act

67
Q

This act covers harmful communications for commercial purposes available to any minor. Fines can go as high as 50,000 with a punishment of up to 6 months in jail.

A

Child Online Protection Act

68
Q

This act states that federally financed schools and libraries must use technology to block minors access to obscene, child pornography, or other harmful material.

A

Children’s Internet Protection Act

69
Q

Making a statement of alleged fact. This statement would be false, harmful, and might cause damage to their reputation.

A

Defamation

70
Q

An oral form of defamation

A

Slander

71
Q

A written form of defamation

A

Libel