Intro to Cybersecurity

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What level of cybersecurity is your online identity?

Personal

What is the main function of the Cisco Security Incident response Team?

To ensure company, system, and data preservation.

What is the main purpose of cyberwarefare?

To gain advantage over advasaries.

What is the purpose of s rootkit?

To gain privileged access to a device while concealing itself.

What is the primary goal of a DoS attack?

To prevent the target server from being able to handle additional requests.

What are the 3 dimensions of the McCumber Cube?

1. Foundation principles for protecting information systems. 2. The protection of information in each possible states. 3. The security measures used to protect data.

Four Steps to Risk Management:

1. Frame the Risk 2. Assess the Risk 3. Respond to the Risk 4. Monitor the Risk

A set of changes done to any program or application with the aim of updating, fixing or improving it is referred to as...

A Patch

Which technology removes direct equipment and maintenance cost from the user of data backups?

A cloud service

What is a security playbook?

A collection of repeatable queries or reports that outline a standardized process for incident detection and response.

A port scan returns an 'open' response. What does this mean?

A service is listening on the port.

You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages.

Confidentiality

What are the 3 foundational principles for protecting information?

Confidentiality, Integrity, Availability

What firewall filters traffic based on the user, device, role, application type and threat profile?

Context-Aware Application Firewall

What do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?

Cryptocurrency

What is the difference between a hacker and a cybersecurity professional?

Cybersecurity professionals must work within legal boundaries.

What type of attack uses zombies?

DDoS

What methods can be used to ensure confidentiality of information?

Data encryption, 2-factor authentication, and username/password

What are the objectives of ensuring data integrity?

Data is unaltered during transit and is not changed by unauthorized entities.

Your neighbor tells you that they don't have an online identity. They have no social media and only use the internet to browse. Are they right?

No.

"Data coming into a program should be sanitized, as it could have malicious content, designed to force the program to behave in an unintended way." This statement describes what security vulnerability.

Non-valid inputs

An individual user profile on a social network site is an example of____.

Online Identity

Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?

Open Authorization

True or False: After a data breach it's important to educate employees, partners, and customers on how to prevent future breaches.

True

True or False: An advanced persistent threat (APT) is usually well funded.

True

An employee is laid off after 15 years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the organization. Ethical or Unethical?

Unethical

What is an example of two-factor authentication?

Your fingerprint and your password.

Internet of Things (IoT)

a large network of physical objects, such as sensors, software, and other equipment. -Connect to the internet -have the ability to collect and share data

What is risk management?

the process of identifying and assessing risk to reduce the impact of threats and vulnerabilities.

Stuxnet malware was designed for which primary purpose?

to cause physical damage to equipment controlled by computers.

What are methods of confidentiality?

data encryption, identity proofing, 2 factor authentication

What is the best way to avoid getting spyware on a machine?

Install software only from trusted websites.

What protocol is used to collect information about traffic traversing a network?

NetFlow

What firewall hides or masquerades the private addresses private addresses of network hosts?

Network Address Translation Firewall

What firewall filters traffic based on source and destination IP address?

Network Layer Firewall

You are looking to print photos from the cloud. After logging in you are automatically given access to the third party printing service. What allowed the auto authentication to occur?

The cloud storage service is an approved application for the online printing service.

What is "Big Data"?

The exponential growth in technology and business due to the expansion of the IoT through virtualization and cloud storage.

A port scan returns a 'dropped' response. What does this mean?

There was no reply from the host.

How does Cisco ISE and TrustSec work?

They enforce access to network resources by creating role-based access control policies.

Why are internet service providers interested in your data?

They may be legally required to share your online information with the government/surveillance agencies/authorities

What is the best method to prevent Bluetooth from being exploited?

Always disable Bluetooth when it is not being used.

What is an example of on-path attacks?

Man-in-the-mobile and Man-in-the-Middle

What tool can be used to provide a list of open ports on network devices?

Nmap

What are ways to ensure integrity?

has functions and checksums

Software Vulnerabilities: occurs through the improper use of practices that manage equipment, data, or applications.

Access Control

Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?

Access Control Problem

Example of how malware might be concealed:

An email is sent to employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.

What do you call a program written to take advantage of a known security vulnerability?

An exploit

What is the last stage of a pen test?

Analysis and Reporting

Behavior-based analysis involves using baseline information to detect what?

Anomalies

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on PC.

AntiSpyware

Which firewall filters traffic based on an application program or service?

Application Layer Firewall

An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing redundancy. What requirement of information security is addressed by implementing the plan?

Availability

Software Vulnerabilities: Occurs when data is written beyond the limits of memory areas that are allocated to an application.

Buffer Overflow

What vulnerability occurs when data is written beyond the memory areas allocated to an application?

Buffer Overflow

What actions should an organization take in the event of a security breach?

Communicate a call to action to all employees and carry out research to uncover what caused the breach.

What are examples of cracking an encrypted password?

Dictionary Attack, Spraying, Rainbow Tables, and Brute Force Attack

What is a key motivation of a white hat attacker?

Discovering weakness of networks and systems to improve the security level of these systems.

An employee points out a design flaw in the new product to the department manager: Ethical or Unethical?

Ethical

True or False: 'Today, there is a single security appliance that will solve all of the network security needs of an organization.'

False

True or False: With careful planning and consideration, some risks can be completely eliminated.

False

What name is given to a device that controls or filters traffic going in or out of a network?

Firewall

What firewall: filters ports and system service calls on a single computer operating system?

Host-Based Firewall

What tool can identify malicious traffic by comparing packet contents to know attack signatures?

IDS

What certification does not expire or require periodic recertification and is geared towards post-secondary graduates and those interested in a career change?

ISACA CSX Cybersecurity Fundamentals

You are surfing the internet using a laptop at a public WiFi cafe. What should you check first before you connect to the public network?

If the laptop requires user authentication for file and media sharing.

Where is cryptocurrency stored?

In a wallet

What should be carried out to address known software vulnerabilities of a specific application?

Install a security patch

What are the foundational principles for protecting information systems as outlined in the McCumber Cube?

Integrity, Availability, Confidentiality

Why might internal security threats cause greater damage to an organization than external security threats?

Internal users have direct access to the infrastructure devices.

IoT

Internet of Things

How is availability achieved?

Maintaining equipment, performing hardware repairs, keeping operating systems and software up to date, and creating backups

What certification is aimed at high school and early college students, as well as anyone interested in a career change?

Microsoft Technology Associate Security Fundamentals

Why do IoT devices pose a greater security risk than other computing devices on a network?

Most IoT devices do not receive frequent software updates.

How can you keep your personal browsing history hidden from other users on a shared computer?

Operate the web browser in a private browser mode.

Which certification is an entry-level for new comers who are preparing to start their career in cybersecurity?

Palo Alto Networks Certified Cybersecurity Associate

What type of attack allows an attacker to use a brute-force approach?

Password Cracking

A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?

Patient Records

What is the best approach to preventing a compromised IoT device from maliciously accessing data and devices on a local network?

Place all of the IoT devices that have access to the internet on an isolated network.

In networking, what name is given to the identifier that both ends of a transmission to ensure that the right data is passed to the correct application?

Port Number

Software Vulnerabilities: Occurs when an ordered or timed set processes is disrupted or altered by an exploit.

Race Condition

What should you do in order to make sure that people you live with do not have access to secure data?

Set up password protection

What tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting, and buffer overflow attacks?

Snort

What pieces of information would be classified as personal data:

Social Security Number, Driver License Number, Data and Place of Birth

What is an example of states of data?

Storage, Processing and Transmission

What are the 3 states of information that needs to be protected?

Storage, Processing, Transmission

What is the McCumber Cube?

a model framework created in 1991 to help organizations establish and evaluate information security initiatives by considering all of the related factors that impact them.

Availability

authorized users are able to access systems and data when and where needed and those that do not meet established conditions are not.

Integrity

ensures that system information or processes are protected from intentional or accidental modification.

What is intellectual property?

properties that allows an organization to gain economic advantage over competitors. Considered to be trade secrets that if lost could prove disastrous. Patents, trademarks, and new product plans

Processing

refers to data that is being used to perform an operation. aka data in process

Transmission

refers to data traveling between information systems (data in transit)

What characteristics describe a worm?

self replicating, travels to new computers without any intervention or knowledge of the user.

Confidentiality

set of rules that prevents sensitive information from being disclosed to unauthorized people, resources, and processes.

Why are social media platforms interested in your online identity?

to gather information based on your online activity that is then shared/sold to advertisers for a profit.

What is the main aim of a Cyber Security Incident Response Team (CSIRT)?

to help ensure organization, system and data preservation by performing investigations into computer security incidents.

What is the most common goal of search engine optimization (SEO) poisoning?

to increase web traffic to malicious sites.

Why are Advertisers interested in your online data?

to monitor your online activities and send targeted ads your way.

Why are websites interested in your online identity?

track your activities using cookies in order to provide a more personalized experience.

An employee is at a restaurant with friends and tells them about an exciting new video game that is under development at the organization they work for. Ethical or Unethical?

unethical


Ensembles d'études connexes

Chapter 12- Gender, Sex, and Sexuality Test

View Set

Comp. A. Section 1. Chapter 6: Pharmacology

View Set

Anatomy Chapter 9 Skeletal Muscle Fibers

View Set

Chemistry Midterm Review: Chapter1-2 Matter and Change

View Set

Events Leading to the American Revolution

View Set