Week 02 Foundations of Cybersecurity Flashcards

1
Q

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently.
A) Artificial neural network (ANN)
B) Artificial general intelligence (AGI)
C) Adversarial artificial intelligence (AI)
D) Artificial swarm intelligence (ASI)

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage.
A) Business Email Encryption (BEE)
B) Business Email Compromise (BEC)
C) Business Email Verification (BEV)
D) Business Email Marketing (BEM)

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malicious code written to interfere with computer operations and cause damage to data and software
A) Computer worm
B) Computer trojan
C) Computer ransomware
D) Computer virus

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attack that affects secure forms of communication between a sender and intended recipient
A) Cryptographic attack
B) Cryptographic protocol
C) Cryptographic hash
D) Cryptographic key

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any person who uses computers to gain access to computer systems, networks, or data
A) Cracker
B) Hacker
C) Breaker
D) Maker

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software designed to harm devices or networks
A) Firmware
B) Shareware
C) Malware
D) Freeware

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attempt to access password secured devices, systems, networks, or data
A) Password cracking
B) Password attack
C) Password recovery
D) Password guessing

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The use of digital communications to trick people into revealing sensitive data or deploying malicious software
A) Fishing
B) Fission
C) Fusio
D) Phishing

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security incident that affects not only digital but also physical environments where the incident is deployed
A) Physical attack
B) Physical security
C) Physical layer
D) Physical access

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location
A) Phishing Attack
B) Man-in-the-Middle Attack
C) Physical Social Engineering
D) Brute Force Attack

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A manipulation technique that exploits human error to gain private information, access, or valuables
A) Social engineering toolkit (SET)
B) Social proof
C) Physical social engineering
D) Social network analysis (SNA)

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack
A) Social media phishing
B) Social media analytics
C) Social media marketing
D) Social media management

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source
A) Spear fishing
B) Spear throwing
C) Spear phishing
D) Spear hunting

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed
A) Supply-chain management
B) Supply-chain optimization
C) Supply-chain integration
D) Supply-chain attack

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network
A) USB charging
B) USB baiting
C) USB formatting
D) USB debugging

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source
A) Vishing
B) Fishing
C) Dishing
D) Wishing

A

Answer: A

17
Q

A type of attack when a threat actor compromises a website frequently visited by a specific group of users
A) Waterfall attack
B) Watering hole attack
C) Watergate attack
D) Watermark attack

A

Answer: B

18
Q

What is a threat actor?
A) Any person or group who presents a security risk
B) Any person or group who defends against security risks
C) Any person or group who investigates security risks
D) Any person or group who creates security risks

A

A

19
Q

What is an example of an advanced persistent threat’s intention?
A) Sabotage
B) Corruption
C) Damaging critical infrastructure
D) Social change campaigns

A

C

20
Q

What is an example of an insider threat’s motivation?
A) Espionage
B) Fame
C) Propaganda
D) Demonstrations

A

A

21
Q

What is an example of a hacktivist’s goal?
A) Gaining access to intellectual property
B) Unauthorized data access or leaks
C) Demonstration
D) All of the above

A

C

C) Demonstration is correct because hacktivism, or hacker activism, often involves using hacking techniques to promote a political agenda or social change. This can include demonstrations where hacktivists make a show of their abilities or the vulnerabilities of systems to raise awareness about certain issues.

22
Q

What is the difference between authorized and unauthorized hackers?
A) Authorized hackers follow a code of ethics and adhere to the law, while unauthorized hackers do not
B) Authorized hackers use existing malware and scripts, while unauthorized hackers create their own
C) Authorized hackers work for pay, while unauthorized hackers work for fun
D) Authorized hackers protect the world from unethical hackers, while unauthorized hackers exploit security weaknesses

A

A

The answer A, “Authorized hackers follow a code of ethics and adhere to the law, while unauthorized hackers do not”, is correct because it accurately describes the fundamental difference between authorized and unauthorized hackers¹²⁴.

Authorized hackers, also known as ethical hackers or white-hat hackers, operate within the boundaries of the law and adhere to a code of ethics². They use their skills to identify and fix security vulnerabilities in systems with the permission of the system owners².

On the other hand, unauthorized hackers, also known as black-hat hackers, do not adhere to these ethical guidelines or laws²⁴. They often use their skills maliciously to gain unauthorized access to systems, often with the intent of stealing valuable data or causing harm²⁴.

While options B, C, and D may contain elements of truth, they do not capture the core difference between authorized and unauthorized hackers as accurately as option A does. For example, both authorized and unauthorized hackers can create their own tools or use existing ones¹, both can work for pay or for fun¹, and while authorized hackers often work to protect systems from unethical hackers, not all unauthorized hackers exploit security weaknesses¹².

Source:
(1) Hacking vs unauthorised access – what’s the difference?. https://itgovernance.co.uk/blog/hacking-vs-unauthorised-access-whats-the-difference.
(2) What Is Ethical Hacking | Cybersecurity | CompTIA. https://www.comptia.org/content/articles/what-is-ethical-hacking.
(3) What is a white hat or ethical hacker? - Paubox. https://www.paubox.com/blog/what-is-a-white-hat-or-ethical-hacker.
(4) Unauthorized Access: Prevention Best Practices | Egnyte. https://www.egnyte.com/guides/governance/unauthorized-access.

23
Q

What is an example of a semi-authorized hacker’s motivation?
A) To conduct organizational risk evaluations
B) To search for vulnerabilities but not take advantage of them
C) To collect and sell confidential data for financial gain
D) To learn and enhance their hacking skills

A

B

24
Q

What is an example of a vigilante hacker’s goal?
A) To safeguard people and organizations from malicious threat actors
B) To seek revenge
C) To exploit security weaknesses by using existing malware, programming scripts, and other tactics
D) To complete the job they were contracted to do

A

A

25
Q

What is a key takeaway from the writing?
A) Threat actors and hackers are technically skilled individuals
B) Threat actors and hackers are motivated by a political agenda
C) Threat actors and hackers are always unethical and illegal
D) Threat actors and hackers are easy to identify and stop

A

A

26
Q

What is a manipulation technique that exploits human error to gain private information, access, or valuables?
A) Password attack
B) Social engineering attack
C) Physical attack
D) Cryptographic attack

A

B

27
Q

What is a security incident that affects not only digital but also physical environments where the incident is deployed?
A) Adversarial artificial intelligence
B) Supply-chain attack
C) Physical attack
D) Birthday attack

A

C

28
Q

What is a technique that manipulates artificial intelligence and machine learning technology to conduct attacks more efficiently?
A) Adversarial artificial intelligence
B) Downgrade attack
C) Collision attack
D) Watering hole attack

A

A

29
Q

What is an example of a physical attack?
A) Malicious USB cable
B) Phishing
C) Card cloning and skimming
D) Both A and C

A

D

30
Q

What is an example of a cryptographic attack?
A) Smishing
B) Vishing
C) Birthday
D) Spear phishing

A

C