Security + Flashcards

(31 cards)

1
Q

What is the CIA triangle?

A

Confidentiality, Integrity, Availability. Loss of one one can lead to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are causes of compromised security?

A

Technology weaknesses, Configuration weaknesses, Policy weaknesses, Human Error or malice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some of the biometric devices used?

A

Fingerprint scanner, hand geometry scanner, eye scanner (including retina and iris scanners), voice verification, signature verification, and DNA scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some Malware varieties?

A

Virus, Worm, Trojan horse, Logic bomb, Rootkit, Spyware, Adware, Keylogger, Botnet, Backdoor, Drive by download, zero day exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a virus?

A

A computer virus is a destructive application that is loaded on your computer. A virus is a program, not data, and you can only catch a virus by running a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the structure of a virus

A

Replication - viruses must propagate themselves. Payload - the malicious activity a virus performs when triggered. Payload trigger - The date or counter or circumstances present when a virus payload goes off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DoS?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DDoS?

A

Distributed denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name some examples of payload

A

Displaying messages, launching DDoS attack Erasing files randomly by type or usage, formatting hard drive, overwrite mainboard bios, sending email, expose private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is encryption?

A

Converting to unreadable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decryption

A

Converting back to readable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Algorithm

A

Procedure for encrypting or decrypting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cipher

A

Pair of encryption and decryption algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptography

A

Science of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

the activity of defrauding an online account holder of financial information by posing as a legitimate company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whaling

A

A type of fraud that targets high-profile end users

17
Q

Vishing

A

The act of using the telephone in an attempt to scam the user into surrendering private information

18
Q

Steganography

A

Hidden messages, often plain text, concealed in images etc.

19
Q

Hashes

A

Fixed length derivation of plaintext

20
Q

Three factors for authentication

A

biometrics, cac card, password (something you are, something you have, something you know)

21
Q

What is the biggest authentication vulnerability

A

Failed password attempts that don’t result in banning

22
Q

What are some authentication vulnerabilities

A

Short and insecure passwords, reusing passwords, saved passwords, protocol and algorithm deficiencies, failed attempts that dont result in banning

23
Q

How many anivirus and anti spyware programs should you have?

A

one antivirus, and as many anti spyware as you want

24
Q

Give an example of a two factor password

A

CAC followed by biometrics

25
What is a trojan horse?
A backdoor installed into your computer so that it can be controlled
26
What is a worm?
Like a virus, but it self replicates continuously until it eventually crashes your computer
27
When updating BIOS, what do you not want to do?
Do not turn off computer
28
What is a botnet?
a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages
29
Give some examples of physical access control
ID badges, proximity cards, smart cards, physical tokens, common access cards, biometrics
30
What does social engineering mostly exploit?
Exploits trust between people
31
What kind of malware is the most common?
Spyware (adware)