Module 2 - Securing Networks Flashcards

(100 cards)

1
Q

Which organization provides an interactive global map that shows live network attacks based on its deployed security products?

A

Kaspersky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Cisco team is tasked with investigating and mitigating vulnerabilities in Cisco products?

A

Cisco Product Security Incident Response Team (PSIRT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Cisco group provides threat intelligence to defend customers and protect digital assets?

A

Cisco Talos intelligence group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of network attack occurs when a system can no longer support requests from legitimate users due to overload or interruption?

A

A DoS attack (Denial of Service).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What term describes the path a threat actor uses to gain access to a server, host, or network?

A

An Attack Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are internal threats potentially more damaging than external threats?

A

Internal threats are potentially more damaging because internal users have direct access to infrastructure and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of threat may involve actions like disconnecting critical network connections or copying data to external media?

A

An internal threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is considered one of an organization’s most valuable assets that must be protected from exfiltration?

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of threat can result from a user inserting an infected USB drive into a corporate system?

A

An Internal threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What term refers to the unauthorized theft, loss, or leakage of sensitive organizational data?

A

Data loss or data exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What controls must organizations implement to prevent data loss and protect sensitive information?

A

DLP (Data Loss Prevention) controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which aspect of device security is crucial in preventing data loss from stolen hardware?

A

Encryption of the stored data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the first line of defense against unauthorized access to sensitive data?

A

Strong and secure passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which concept refers to a potential danger to an organization’s asset, such as data or its network infrastructure?

A

A Threat - {a possible event or actor that may cause harm by targeting valuable assets like data, servers, or devices.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which term describes a flaw or weakness in a system’s design or configuration that could be used by a threat to gain unauthorized access or control?

A

A Vulnerability -{it represents a weak point in the system that a threat actor can exploit.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which concept represents the combined total of all vulnerabilities in a system that are exposed and accessible to an attacker?

A

The Attack Surface - {this includes every potential entry and exit point in a system, such as unpatched software or exposed services.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which term defines the probability that a threat will successfully exploit a vulnerability and cause harm to an asset?

A

Risk -{it measures the likelihood and impact of a threat actor exploiting a specific weakness.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of exploit allows an attacker to compromise a system over a network without needing prior access to it?

A

A remote exploit -{ it does not require the attacker to have an account or direct access to the target system.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which term refers to the tool, method, or technique used to take advantage of a vulnerability in order to compromise a system?

A

An Exploit - {it is the actual mechanism or process that makes use of a vulnerability to harm or gain unauthorized control.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of hacker uses their programming knowledge for ethical and legal purposes, such as performing penetration tests and reporting security flaws to developers?

A

White hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of exploit is used when the attacker already has user or administrative access on the target system?

A

A local exploit -{this involves leveraging a vulnerability from within the system, without necessarily needing physical access.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which strategy eliminates an activity or asset entirely to prevent any exposure to associated risks, even if it means losing its benefits?

A

Risk Avoidance -{this method removes the source of the risk by stopping the activity that causes it.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which risk management strategy involves taking no action because the cost of protection is greater than the cost of the potential risk?

A

Risk acceptance -{this strategy accepts the risk as-is without applying mitigation due to cost inefficiency}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which risk management approach involves minimizing the likelihood or consequences of a risk by taking protective actions, and is considered the most commonly used method?

A

Risk Reduction -{this involves applying cost-effective actions that lower either the impact or likelihood of the risk.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Which method of managing risk involves assigning responsibility for some or all of the risk to another party, such as an insurance provider?
Risk Transfer -{this shifts financial or operational burden to a third party in case the risk occurs.}
10
Which term refers to the set of actions taken to protect assets by reducing risk or mitigating specific threats?
Countermeasure -{these are protective measures designed to defend against identified risks.}
11
Which term defines the extent of harm or disruption an organization could suffer due to a realized threat?
Impact -[potential consequences or severity of damage resulting from a threat.}
11
Which process balances the costs of implementing protective measures with the value of securing assets and minimizing loss?
Risk management
12
Which hacker type discovers and sometimes exploits network vulnerabilities without permission but typically informs the organization or discloses it publicly without seeking personal gain?
Gray hat hackers
13
Which type of hacker violates network security for personal gain or malicious purposes, such as stealing data or disrupting systems?
Black hat hacker
14
Which term is used throughout this course to describe individuals or groups that may fall under the grey or black hat category?
Threat actors
14
Which early form of hacking involved mimicking telephone tones to manipulate phone systems and make free long-distance calls?
Phone freaking or Phreaking
15
Which kind of hacker emerged in the 1990s and refers to unskilled individuals using pre-existing hacking tools or scripts, typically without understanding how they work?
Script kiddies
15
Which term refers to the hacking method where programs were written to dial every number in an area to find accessible computers or devices over phone lines?
War dialing
16
Which category of hacker is typically a grey hat who discovers vulnerabilities and reports them to vendors, sometimes for cash or recognition?
A vulnerability broker
17
Which group of threat actors uses hacking as a form of political or social protest, often leaking sensitive data or performing DDoS attacks to make a statement?
Hacktivists
18
Which black hat group may be self-employed or part of organized crime, typically motivated by financial gain through data theft or fraud?
Cybercriminals
19
Which group conducts cyber operations to steal state secrets, gather intelligence, or sabotage foreign networks, often under government directive?
State-sponsored hackers
19
Which type of hacker might receive bounties from organizations as a reward for responsibly disclosing vulnerabilities?
White hat hacker
20
Which threat actor frequently targets both consumers and small businesses, in addition to attacking large enterprises?
Cybercriminals
21
Which task involves verifying the credibility and reliability of companies that provide IT hardware and software services?
A Trustworthy IT vendor
22
Which test simulates real-world attacks on a system or network to uncover vulnerabilities?
Penetration test
23
Which protective measure involves creating secure copies of data on both remote servers and physical devices?
Backing up to the cloud and hard disk
24
Which term refers to identifiable attributes such as IP addresses, filenames, and software changes that reveal a cyberattack has occurred?
IOCs (Indicators of Compromise)
25
Which annual campaign every October is co-sponsored by CISA and NCSA to promote security awareness each October?
NCASM (National cybersecurity Awareness month)
25
Which cybersecurity concept focuses on understanding the motivation and strategy of attackers rather than identifying specific signs of an attack?
IOAs (Indicators of Attack) -{ Focus on what the attacker is trying to do, not just what has already happened}
25
Which sharing platform is used by the U.S. government to speed up threat mitigation by distributing verified IOCs to businesses?
AIS (Automated Indicator Sharing) - {operated by CISA to distribute threat data efficiently}
26
Which CISA system allows near real-time exchange of verified threat information between the U.S. government and private sector?
AIS (Automated Indicator Sharing)
26
Which agency leads U.S. efforts to automate threat information sharing between government and private organizations?
CISA (Cybersecurity Infrastructure Security Agency) -{responsible for coordinating threat sharing.}
27
27
27
27
Which European agency provides cybersecurity solutions and advice for EU member states?
ENISA (European Union Agency for Cybersecurity) -{the EU counterpart to the U.S. CISA}
27
28
28
29
30
31
32
33
34
35
36
37
38
39
40
41
41
42
43
44
45
46
47
47
48
49
50
51
51
51
52
53
53
54
55
56
57
58
58
58
58
59
59
60
61
62
63