Kahoots Flashcards
(91 cards)
What involves psychological manipulation of people to divulge information or perform actions that benefit attackers?
Social Engineering
True or False: A targeted social engineering attack on a specific user for his/her specific likes is known as an insider attack.
False
True or False: Cybersecurity in the supply chain can be viewed as an information technology problem only.
False
Ensuring a third party is ___________ data is an important prerequisite when considering cloud computing.
Securing
A third party contractor gaining _______ unauthorized access to information systems is considered an insider threat.
Physical or Virtual
What malware has the defining factor of being able to replicate itself without user interaction?
Worm
Malicious code is a category including _________ and website scripts that can be uploaded into a vulnerable system.
Malicious Software (malware)
What are the two common pathways from criminals to users?
Email and World Wide Web
Where does a “boot-sector virus” reside?
First sector of a disk or Universal Serial Bus (USB) drive
File infector viruses will infect what type of files?
Executable Files
A worm has the unique characteristic of being able to replicate without needing _________ to activate the virus.
a user
Per the STRIDE model, what threat involves claiming you didn’t do something or were not responsible for an action?
Repudiation
Per the STRIDE model, what term is described by exhausting resources needed to provide service?
Denial of Service
Name the destructive behavior where the attacker changes entries in records.
Data diddling
What are the ways to characterize an attack?
intent, point of initiation, and method of delivery
Which network attack is difficult to address because it sends more requests to one machine than it can handle?
Distributed Denial of Service (DDoS)
When Network Access Control connects to a network, what can it scan for on the system?
Virus definitions, antivirus software, and operating systems updates
Agentless Network Access Control does not require a/an agent _________ to be installed on a client.
software
True or False: Dissolvable agents run the NAC check for a current status of the system and remain installed on the system.
False
What type of authentication factor requires a biometrics system?
something you are
What type of authentication factor is based on user habits like typing patterns?
something you do
True or False: Combining username & password is considered multi-factor authentication.
False
Why are Universal Serial Bus (USB) devices particularly dangerous to computer systems and networks?
Worms can activate and spread just by plugging one in to a computer, they are easy to conceal, they hold large amounts of data
What is a cryptographic processor stored on a separate card and installed on a system as an add-on device?
Hardware Security Module (HSM)