midterm Flashcards
(80 cards)
Which of the following best describes the possible impact of an attack where credit card data is stolen from a company and the breach is eventually reported in the news? Select two.
Income generating loss
Possible prison time for IT personnel
Which of the following best describes the differences or similarities between cybersecurity and information security? Select three.
Information security falls under the cybersecurity umbrella.
Cybersecurity primarily protects devices.
Information security protects using products, people, and procedures.
Which of the following lists the data type in order from the type that needs the highest level of protection to the lowest level?
Confidential, private, sensitive
Gemalyn enters websiteA.com in the address bar of a browser but is redirected to websiteB.com due to an infected DNS. What type of exploit did Gemalyn experience?
A redirection technique called pharming.
An attacker is scanning wireless networks and discovers that one of them is set up to support the two most recent protocols. What type of attack is the malicious actor most likely to launch to try to breach the security settings of the wireless device?
Downgrade attack
Kalaki subscribes to an online computer digest. Kalaki notices a string of characters with a message next to a link that reads “… use to verify file integrity after downloading.” What does the string of characters represent? Select four.
The result of a one-way algorithm
A message digest
A hash
A digital fingerprint
Charlie, a manager, wants to implement TLS because he thinks it is easier to configure. However, Perry recommends using IPSec instead. Which of the following statements could be used to justify implementing one over the other? Select two.
IPSec authenticates that packets received were sent from the source.
IPSec manages the keys to ensure they are not intercepted by unauthorized parties.
IPSec is considered a transparent protocol. Which of the following statements best describes what this means? Select two.
Users do not need to be trained on specific security procedures.
Programs do not need to be modified to run under IPSec.
Jefferson downloads a version of PowerShell that is purported to have capabilities that exceed those of the native version. Shortly thereafter his computer starts to exhibit unusual behavior. The installed anti-malware tool does not reveal anything he does not already know. What type of malware is most likely to be installed on the system?
Fileless virus
Pamela installed a program that scanned the internet for coupons. A week later her bank account was hacked. How was Pamela’s bank account most likely compromised?
She installed a computer Trojan.
Which of the following best describes characteristics of embedded systems? Select two.
They are contained within a larger system.
They are designed for a specific function.
Which of the following statements represents steps that can be taken to harden SCADA systems? Select two.
Disconnect unnecessary connections to the SCADA network.
Identify all connections to SCADA networks.
As a security professional Anvi works for an organization authoring documents that define policies and procedures outlining security controls. What type of resource does the organization provide?
Framework
Which of the following best describes what a nation-state actor is most likely to do if their attacks against a target are not successful?
Continue trying until successful.
Which of the following can be included under the physical security controls umbrella? Select three.
Data leakage
Gel-based paint
Perimeter defenses
Lamarr receives a text message indicating the password to his bank account has been changed but needs verification to commit the change. It includes a number to call and a link, both of which will lead to fraud if Lamarr follows through with the instructions. This is an example of what type of attack?
Smishing
Which of the following statements best describes the critical factor that allows cryptographic algorithms to be effective?
The key(s) used by algorithms must be securely guarded.
Johnny develops an app to encrypt short messages. He runs the encryption program, but it is designed to deliberately introduce a 5- to 15-second delay before encryption begins. What type of data is Johnny about to encrypt?
Plaintext
A key was revoked before it expired. Xan takes the revoked key out of the revocation state and reactivates it to extract and decrypt old messages from an email archival system. What is this type of key reactivation called?
A revoked key cannot be reinstated.
Which of the following is a true statement regarding the indicated block cipher mode? Select two.
GCM computes a MAC to ensure the message was not tampered with during transmission.
CBC uses the output of a round of encryption as input for the next round.
A company determines that some of their computers are using specially coded attack commands that have been posted on certain social media sites. Every single one of the infected computers is considered a ________.
zombie
Pamela installed a program that scanned the internet for coupons. A week later her bank account was hacked. How was Pamela’s bank account most likely compromised?
She installed a computer Trojan.
For security reasons, an app has the restriction that it can only be used within a one-kilometer radius of a secure facility. What is being used to enforce this restriction?
Geofencing
Kaven, an app developer, works for an organization that requires the implementation of dead code. Why would the organization have such a policy? Select two.
To provide an unnecessary attack vector for attackers.
Because it is one of the secure coding techniques the organization uses.