GR Flashcards

(77 cards)

1
Q

What concept states that defenders must secure every vulnerability, while attackers only need to exploit one?

A

The asymmetry of defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What security concept relies on multiple tools / techniques simultaneously?

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which defense mechanism is primarily designed to monitor and analyze network traffic for suspicious activities?

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which defense mechanism is primarily designed to actively block and prevent malicious activities?

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the benefits of proxies?

A

Can inspect packet contents; Can trace/filter inappropriate requests; Can cache answers for faster responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a firewall?

A

A firewall is a network device that forwards some network data (i.e., packets) and filters others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the context of a firewall, what is the purpose of an allow-list?

A

Permits only traffic on the list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which intrusion detection method relies on predefined patterns or signatures of known threats?

A

Signature-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name legitimate personal security recommendations?

A

Keep your system up to date with the latest patches; Use a VPN when you are on public networks; Only use strong passwords and do not reuse passwords; Don’t install software unless you absolutely need it; Don’t trust unfamiliar links or attachments in emails; Don’t let people log into your personal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the cyber-attack methology steps?

A

Gaining Access
Maintaining Access
Scanning
Reconnaissance
Covering Tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the difference between the Recon and Scanning phases?

A

Recon is passive, Scanning is active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This type of malware is disguised as a legitimate program

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of malware has elevated privileges and is designed to remain undetected

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This type of malware executes when a specified condition is triggered

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This type of malware attaches to a “host” file that spreads by user interaction

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This type of malware spreads without user intervention

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This type of malware bypasses normal authentication mechanisms

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This type of malware records inputs to your computer

A

keystroke logger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This type of malware gathers and reports information about a user

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A buffer overflow vulnerability occurs when:

A

Input exceeds the capacity of a defined storage area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of cyber attack is commonly associated with targeting humans through deceptive emails or messages?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which cybersecurity threat is most closely related to compromising personal computers by exploiting vulns in software?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

If a cyber attack aims to overwhelm and disrupt the functionality of servers, what type of attack is likely occurring?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an attack on websites that involve injecting malicious code to manipulate user interactions?

A

Cross-Site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which security concern is primarily associated with infiltrating databases and manipulating information?
SQL Injection
26
How can we best defend against SQL and XSS attacks?
Using secure coding practices and input validation
27
What does the term "Internet of Things" refer to?
The integration of physical devices with the internet.
28
In the context of IoT, which statement is true regarding the prioritization of usability and security?
Usability is prioritized over security.
29
What is a zero-day exploit, and why is it highly prized in the realm of cybersecurity?
An exploit targeting an unknown vulnerability with no known patches
30
What does SCADA stand for?
System Control and Data Acquisition
31
What is the primary purpose of SCADA?
Real-time Monitoring and Control
32
What is a common vulnerability associated with industrial control systems (ICS)?
Inadequate authentication measures
33
Which statement best describes how cyber operations can have physical effects?
Manipulating digital systems can lead to physical consequences.
34
What is the primary goal of a cyber-attack methodology?
To exploit vulnerabilities and compromise a system
35
What is the most likely potential objective of a cyber-attack in the political domain?
Misinformation
36
What is the significance of network mapping in cybersecurity?
To identify and visualize the structure of a network
37
What are the 3 main methods to crack a password?
Brute force, dictionary, rainbow table
38
Which type of password attack involves trying all possible combinations of characters to guess the password?
Brute force attack
39
What is a recommended characteristic of a strong password?
Inclusion of uppercase and lowercase letters, numbers, and symbols
40
Machine learning involves __________ that can derive rules/behaviors from datasets.
algorithms
41
What is the first (and probably most important) step required for supervised learning?
Gather Data
42
An artificial intelligence (AI) designed to beat humans at the video game "Civilization" is an example of general AI.
False
43
What type of dataset would you likely use to train a ML model to analyze social networks to identify cliques
Unlabeled dataset
44
For a supervised Machine Learning model to predict risk of heart disease, which of the following is an instance?
Age: 45, Weight: 155lbs, Sex: Female, Disease: None
45
Human Expertise is required in ML in order to cultivate datasets and verify that the algorithms are working as intended.
True
46
Which of the following is one of the limitations of current AI?
Lack of Interpretability
47
Artificial Intelligence can be generally categorized based on whether it...
Thinks or acts like a human or rationally
48
Input, Process, and Output simply describes what?
A Computer
49
Which of the following will you find on a server?
Files, Email, Website
50
What's the difference between a client and a server?
A client accesses data, a server stores data
51
Can a client can act as both a client and server simultaneously?
True
52
What is the primary role of protocols in network communications?
Defining the rules and standards for data exchange.
53
What protocol helps computers find each other on a network?
Internet Protocol
54
A logical location where applications listen for incoming data is what?
A Port
55
What is HTTPS and what port does it use?
Hypertext Transfer Protocol Secure - 443
56
What must a client include when requesting a webpage?
source Port destination IP A message destination Port source IP
57
An algorithm is a(n) __________ of executable steps
ordered set
58
How many keys are needed for 1-to-1 secure communication?
4
59
What is one task in the 'Covering Tracks' phase of cyber attacks?
alter log files
60
What is a form of exploiting human aspect of security?
phishing
61
What are two ways to identify malware?
signature-based, behavior-based
62
An attack in which the purpose is to overload a server by flooding it with requests is called...
denial of service
63
An AI that defaults to identifying a person with greater success based on their hair color is what type of limitation?
Hidden Bias
64
Ambiguous Responsibility means what with regard to AI?
It is not clear who/what to hold at fault
65
List memory hierarchy
CPU, registers, CPU cache, lvl 1 cache, lvl 2 cache, main memory, RAM, secondary memory, hard drive, archival storage, tapes/dvds/discs, cds
66
Define Moore's Law
The # of transistors that can be placed on a circuit doubles every 2 years.
67
Place the components where they belong in the Von Neumann Architecture
Memory, input, CPU, output
68
Which of the following rights is protected by the Fourth Amendment to the United States Constitution?
Right to Privacy
69
Which act prohibits intentionally accessing a computer without authorization or in excess of authorization?
Computer Fraud and Abuse Act
70
In the context of military cyber operations, what does LOAC stand for?
Laws of Armed Conflict
71
What are the basic principles needed for LOAC?
Distinction Proportionality Chivalry Humanity Military Necessity
72
Which principle aims to prevent excessive loss of life and damage to property?
Proportionality
73
What are switches?
Move information traffic within a local network
74
What IPvX protocol standard has more addresses?
IPv6
75
Sometimes IP addresses are dynamic because...
IP addresses are limited in number Hosts (DHCPs) are dynamic in nature
76
Virtual Private Networks (VPNs)
Reduces the possibility of man-in-the-middle attacks
77
What is sniffing?
Is especially a problem for WiFi