Kahoots Flashcards

(91 cards)

1
Q

What involves psychological manipulation of people to divulge information or perform actions that benefit attackers?

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: A targeted social engineering attack on a specific user for his/her specific likes is known as an insider attack.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: Cybersecurity in the supply chain can be viewed as an information technology problem only.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensuring a third party is ___________ data is an important prerequisite when considering cloud computing.

A

Securing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A third party contractor gaining _______ unauthorized access to information systems is considered an insider threat.

A

Physical or Virtual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What malware has the defining factor of being able to replicate itself without user interaction?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malicious code is a category including _________ and website scripts that can be uploaded into a vulnerable system.

A

Malicious Software (malware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two common pathways from criminals to users?

A

Email and World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where does a “boot-sector virus” reside?

A

First sector of a disk or Universal Serial Bus (USB) drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File infector viruses will infect what type of files?

A

Executable Files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A worm has the unique characteristic of being able to replicate without needing _________ to activate the virus.

A

a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Per the STRIDE model, what threat involves claiming you didn’t do something or were not responsible for an action?

A

Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Per the STRIDE model, what term is described by exhausting resources needed to provide service?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the destructive behavior where the attacker changes entries in records.

A

Data diddling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the ways to characterize an attack?

A

intent, point of initiation, and method of delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which network attack is difficult to address because it sends more requests to one machine than it can handle?

A

Distributed Denial of Service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When Network Access Control connects to a network, what can it scan for on the system?

A

Virus definitions, antivirus software, and operating systems updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Agentless Network Access Control does not require a/an agent _________ to be installed on a client.

A

software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: Dissolvable agents run the NAC check for a current status of the system and remain installed on the system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of authentication factor requires a biometrics system?

A

something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of authentication factor is based on user habits like typing patterns?

A

something you do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False: Combining username & password is considered multi-factor authentication.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why are Universal Serial Bus (USB) devices particularly dangerous to computer systems and networks?

A

Worms can activate and spread just by plugging one in to a computer, they are easy to conceal, they hold large amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a cryptographic processor stored on a separate card and installed on a system as an add-on device?

A

Hardware Security Module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
To prevent data theft and worms, USB data ports are _________ on Department of Defense computers.
disabled
26
When Bitlocker is enabled, Windows 7 and newer versions can't boot without a key. What type of encryption is this?
full disk encryption (FDE)
27
When using Full Disk Encryption (FDE), what stores the cryptographic keys within the system?
Trusted Platform Module (TPM)
28
Storage Drive encryption can encrypt what kinds of storage drives?
Hard drives and Universal Serial Bus (USB) drive
29
Which of the following is NOT an authentication factor?
Someone you know
30
What service has this drawback: if an account is compromised, a hacker can access multiple servers rather than one?
Single-Sign-On (SSO)
31
What must be supplied by a user who’s attempting to connect to a network secured with 802.1X?
Valid Credentials
32
Any network resources the user consumes during their session is logged. What is this process called?
Accounting
33
What's defined as presenting information about yourself to a system?
Identification
34
What protocol does DIAMETER use to send and secure data during transmission?
Transmission Control Protocol (TCP)
35
What AAA protocol gives less reliable/secure service through User Datagram Protocol (UDP)?
Remote Authentication Dial-In User Service (RADIUS)
36
The code is checked for functionality in what stage of the SDLC?
Testing
37
Which software development life cycle requires completion of each development phase before moving to the next phase?
Waterfall
38
During the Agile SDLC process, when can developers backtrack or repeat steps?
Anytime
39
In what attack is malicious code injected into a web application via a script?
Cross Site Scripting (XSS)
40
Websites store cookies containing user preferences and _________ information.
logon
41
What risk is posed by enabling the "Remember Me" feature with internet browsers?
cross-site forgery
42
What provides web filtering?
Proxy server
43
Network administrators implement permissions on files and folders to build what?
Access Control List (ACL)
44
Which NTFS permission gives a user all permission possible?
Full Control
45
Group policy can be centrally configured for the network through _____________.
Active Directory
46
When creating a firewall plan, you will typically create all of the following zones EXCEPT what?
communal zone
47
What should be placed in a private zone?
Local Area Network (LAN)
48
What security zone contains the internet?
public zone
49
In what security zone would you put a limited-access server?
extranet zone
50
In what security zone would you put a Wi-Fi network?
wireless zone
51
By having secure network user habits, the cyber _________ of the network is ensured.
hygiene
52
True or False: To ensure antivirus definitions are kept up to date, users should allow their software to perform automatic updates.
True
53
How often should antivirus software be set up to automatically perform security scans?
Regularly
54
Before you dispose of a computer you should use a wipe utility program to _________ the entire hard drive.
overwrite
55
What incident response team role has technical expertise to assess and identify the scale of the security incident?
Technical Specialist
56
What document should define each team member's roles and responsibilities?
Incident Response Plan
57
How would the following incident/event be categorized: normal functionality is denied.
CAT 4 - Denial of Service
58
How would the following incident/event be categorized: authorized user breaches AF policy.
CAT 5 - Non-Compliance Activity
59
How would the following incident/event be categorized: event that is a false alarm.
CAT 9 - Explained Anomaly
60
How would the following incident/event be categorized: event undergoing further review.
CAT 8 - Investigating
61
A/an _________ is an observable occurance in a system and/or network.
event
62
A/an _________ is an assessed occurance in a system and/or network that jeopardizes the information system.
incident
63
If a virus is discovered on a system, who should isolate the computer from the network?
first responder
64
Cyber Incident Response: What's the first incident response phase where the AF detects activity with a variety of means and capabilities?
Detection & Reporting Events
65
During an incident, what must the incident handling staff do with the data to allow for further incident analysis?
preserve integrity of data
66
The goal of a network incident first responder is to _________ the incident.
contain
67
What is the starting point for all future configuration assessments?
Baseline
68
True or False: Baselining will require updating to make it current with a desired configuration.
True
69
When creating a baseline, what metric will change the perspective of your data?
time span and starting point
70
It's necessary to maintain a/an _________ to revert the system after changes if needed.
baseline
71
Which backup method backs up files that were altered since the last backup and clears the archive flag after?
Incremental Backup
72
Disaster Recovery Plan: In which step would you form a team to assist in the entire disaster recovery operation?
Assemble a Disaster Recovery Team
73
In which step would you gather and document equipment, policies, telephone numbers, and other valuable documents?
data collection
74
When should gathering information take place during root cause analysis?
first step
75
Root Cause Analysis: During which phase should personnel continuously review the incident to ensure accuracy?
Validate the Incident
76
What part of post-incident analysis captures lessons learned, initial root cause, and other problems?
postmortem
77
Name the all-source report that focuses on individuals, groups, or organizations ID'd as threats to DoD networks.
Network Intelligence Report (NIR)
78
All involved personnel should ID and ______ all relevant information about a network incident for future analysis.
collect
79
What document identifies potential foreign threats to Department of Defense networks?
Network Intelligence Report (NIR)
80
Having the goals of Confidentiality, Integrity, and Availability best describes which security program?
COMPUSEC (Computer Security)
81
TEMPEST is a security program that identifies compromising _________ in information systems
emanations
82
What level of classification, if disclosed, could cause exceptionally grave damage to national security?
Top Secret (TS)
83
OPSEC reduces mission vulnerabilities by eliminating or reducing adversary collection of _______.
critical information
84
Cryptography is the use of coding systems to _________ information.
encrypt & decrypt
85
TRANSEC results from all measures designed to protect intentional transmissions by means other than what?
crypto analysis
86
What security program focuses on end-point security, ports, protocols, and service management within the Air Force?
COMPUSEC
87
_________ vulnerabilities come from unintentionally emitted signals or compromising emanations.
TEMPEST
88
Which of the following would be considered the LEAST classified compared to the others?
Confidential (C)
89
Which security program is a continuous process and an inherent part of military culture?
OPSEC
90
We aim to defeat our enemy's crypto analysis efforts with our _________ systems.
cryptographic
91
_______ is applying cryptosecurity techniques to each situation so our intercepted signals will be unintelligible.
TRANSEC