Intro to Cyber Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

there are ___ bits in a byte

8

I can get ___ different numbers from 3 bits

8 2 x 2 x 2 000, 001, 011, 111, 010, 100, 110, 101

Standard

A detailed written definition of how software and hardware are to be used

POLICY

A short written statement that defines a course of action that applies to the entire organization

What is the purpose of the CIA Triad?

Balanced Decision Making in Cyber Security

What does the CIA in the CIA Triad stand for?

Confidentiality Integrity Availability

a ____ can provide the fingerprint of a file

Hash

What are the 7 domains of IT infrastructure? (select the correct 7)

LAN-to-WAN Domain User Domain Systems/ Application Domain WAN Domain LAN Domain Work Station Domain Remote Access Domain

Half a byte is a

Nybble

Highest Level Document. It's typically short and you must comply with it

Policy

Must follow this document, unless you document exceptions

Standard

Guideline

Suggested course of action for using the policy, standard, or procedure

A user can easily change their own computer's MAC or IP address.

True

One of the CISSP domains includes Physical Security True or False

True

Common Threats in User Domain

-Lack of user awareness -User apathy toward policies -User violating security policy -User inserting CD/DVD/USB with personal files

What is 255 (Base 10) in binary (show your work)?

1111 1111

What is 11111111 (binary) in decimal (show your work)?

255

an IPv4 address is ____ bytes

4

What is Cybersecurity?

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

I create a hash of a file with SHA-1. I create a hash of a file with MD-5. These two hashes should be the same because the files are identical.

False

I take a SHA-1 hash of a file. I compress the file using zip. I take a hash of the zip'd file. These two hashes should be the same because the data within the file can be exactly recovered and there is no change to it.

False

the file size of "mary had a little lamb" as a text file will be nearly the same size as "mary had a little lamb" stored as a .doc file (in word).

False

Preferred way of doing things- but you don't have to follow it

Guideline

ipconfig /all can provide both _____ address and ______addresses

MAC address and IP address

What is integrity in Cyber Security?

Maintain valid, uncorrupted, and accurate information. 1. Data is not altered 2. Data is Valid 3. Data is Accurate

Depending on your company culture, you must follow this document (e.g. utilities always follow it / them)

Procedure

What is confidentiality?

Protecting information against unauthorized access and use.

What is availability?

System / data is there when you want it.

CISSP stands for Certified Information System Security Professional True or false?

True

I take the MD-5 hash of a file. I change the name of the file and hash it again. these two hashes will be identical even though the name of the file has been changed.

True

The CIA Triad is included in one of the CISSP Domains True or False

True

The User is the Weakest Domain True or False

True

The total employed in the cyber security workforce is almost 1M! True or False

True

https://haveibeenpwned.com/ can tell me if one of my accounts has been compromised (e.g. user ID and password stolen) True or False

True

https://www.cyberseek.org/heatmap.html can provide information on the types of cyber security jobs available by State! True or False

True

you can hide information in a word document that the word program won't see True or False

True

Procedure

Written instructions for how to use the policy and standard

which of the below DOES NOT describe non-repudiation?

agreement between two people that a third party is in error

What are the 5 pillars of Information Assurance and Security?

non-repudiation Authentication Integrity Availability Confidentiality

Pillars of Information Assurance

◦C- confidentiality ◦I - integrity ◦A- availability ◦N- non-repudiation A- authentication


Conjuntos de estudio relacionados

Testout 7.0 14.7 Malware Protection

View Set

EXPERIENCE Chapter 6 Psychology Lab: Classical Conditioning

View Set

Next Term, We'll Mash You Next Term"

View Set

constitution of india- imp case laws

View Set