Chapter 1-10
What was the first search engine created in 1990 by Alan Emtage?
Archie
Match the term on the left to the definition on the right:
Availability attack - Attack that prevents access Confidentiality attack - Attack that extracts information Integrity attack - Attack that changes the information
Edward Snowden worked for which contractor before he started his whistleblowing campaign against the NSA?
Booz Allen Hamilton
____________________ was considered one of the biggest military cyber security breaches. It involved a servicemember putting a USB he had found in a parking lot into his government computer.
Buckshot Yankee
Who is the top cyber security expert in an organization?
CISO
You would typically hear a _______________ say, "Fail to plan. Plan to Fail." From Meeuwisse's book.
Cybersecurity Architect
What government agency developed the Advanced Research Projects Agency Network (ARPANET)?
Department of Defense
Sony was attacked due to the release of a movie, what was the title of the movie?
The Interview
Cyber attackers mainly fall into 8 groups. These include: Nation States, Terrorist Groups, Organized Criminal Groups, Hacktivists, Skilled Professional Hackers, Opportunistic Insiders, Amateur Hackers and anyone!
True
There is a fine line between hacktivism and cyber terrorism.
True
In this country, the only Internet service provider is the government. It blocks access to many sites and monitors all e-mail accounts in Gmail, Yahoo and Hotmail
Turkmenistan
The very first step in the attack on Target appears to have an attack on a subcontractor. It is believed that the thieves used a _____________ to steal the identity of the supplier's permission credentials.
botnet
John the Ripper and THC Hydra are used to what?
crack-passwords.-password-cracking
A ________________ is a protective layer between your computer and the internet?
firewall
One documented case of cyber terrorism was the ________________.
not stuxnet
List the three types of networks discussed in the slides for this module:
wide-area--local-area--peer-to-peer WAN--LAN--P2P
Who was interviewed in the Nova video?
Edward Snowden
__________ is an independent agency in the US government created by statutes to regulate interstate communications by radio, television, wire, satellite, and cable.
FCC
A DDOS attack that took down a network is an example of the confidentiality principle in the CIA Triad
False
An Advanced Persistent Threat (APT) attack is more opportunistic than targeted.
False
As information technology grows, the number of cybercrimes is decreasing.
False
Just as a street address determines where mail should be delivered, a _________ address identifies computers on the internet.
IP
List 3 of the 8 most common cyber attacks (from the module slides):
Malware Phishing password attack
Two rather large and far-reaching security flaws found back in late 2017 are known as:
Meltdown & Spectre
The CIA Triad is best described as:
Model designed to guide policies for information security within an organization
Admiral Rogers in the video was in charge of what US government office until May 2018?
NSA
____________ __________is the internet's guiding principle: "It preserves our right to communicate freely online.
Net neutrality
Who was apparently the attackers in the "Estonian cyberwar"?
Patriotic hackers from Russia
From the outside reading on HBGary Federal, what was the considered the worst outcome from the attack?
Reputation of the company
Which country has allegedly hacked the United States Elections?
Russia
British intelligence reportedly replaced instructions in a terrorist magazine with what?
A cupcake recipe
The attack surface is referred to as the target area. According to Cybersecurity for Beginners, there are ___________ cyber defense points and __________ major categories in the cyber attack surface.
6, 6
The group known as Anonymous is an example of:
Hacktivists
Which one of the following is an example of a disruptive cyberattack?
Hacktivists defacing a government website