Unit 1 (Chapter 1, 2, 3, 4)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How can an attacker use a hoax? A. A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. B. By sending out a hoax, an attacker can convince a user to read his email more often. C. A user who receives multiple hoaxes could contact his supervisor for help. D. Hoaxes are not used by attackers today

A. A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings.

What is the term used for a threat actor who controls multiple bots in a botnet? A. Bot herder B. Zombie shephard C. Rogue IRC D. Cyber-robot

A. Bot herder

Which of these is NOT a characteristic of a secure hash algorithm? A. Collisions should be rare B. A message cannot be produced from a predefined hash C. The results of a hash function should not be reversed. D. The hash should always be the same fixed size.

A. Collisions should be rare

What is the name of the threat actor's computer that gives instructions to an infected computer? A. Command and control (C&C) server B. Resource server C. Regulating New Server(RNS) D. Monitoring and Infecting (M&I) server

A. Command and control (C&C) server

Which of the following is NOT a primary trait of malware? A. Diffusion B. Circulation C. Infection D. Concealment

A. Diffusion

Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document? A. Extinguish risk B. Transfer risk C. Mitigate risk D. Avoid risk

A. Extinguish risk

Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format? A. HIPPA B. HLPDA C. HCPA D. USHIPA

A. HIPPA

What is a characteristic of the Trusted Platform Module (TPM)? A. It provides cryptographic services in hardware instead of software. B. It allows the user to boot a corrupted disk and repair it C. It is available only on Windows computers running BitLocker. D. It includes a pseudorandom number generator (PRNG).

A. It provides cryptographic services in hardware instead of software.

Proving that a user sent an email message is known as _____. A. Non-repudiation B. Repudiation C. Integrity D. Availability

A. Non-repudiation

Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use? A. Obscurity B. Layering C. Diversity D. Limiting

A. Obscurity

Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users' needs. Which of these generally recognized security positions has Ian been offered? A. Security administrator B. Security technician C. Security officer D. Security manager

A. Security administrator

Which position below is considered an entry-level position for a person who has the necessary technical skills? A. Security technician B. Security manager C. Security administrator D. CISO

A. Security technician

Which of the following is an enterprise critical asset? A. System software B. Information C. Outsourced computing services D. Servers, routers, and power supplies

A. System software

Which of these is considered the strongest cryptographic transport protocol? A. TLS v1.2 B. TLS v1.0 C. SSL v2.0 D. SSL v2.0

A. TLS v1.2

The Hashed Message Authentication Code (HMAC) ______________. A. encrypts only the message B. encrypts only the key C. encrypts the key and the message D. encrypts the DHE key only

A. encrypts only the message

What term best describes when cryptography is applied to entire disks instead of individual files or groups of files? A. full disk encryption B. system encryption C. OS encryption D. disk encryption

A. full disk encryption

Which term below is frequently used to describe the tasks of securing information that is in a digital format? A. information security B. physical security C. network security D. logical security

A. information security

Select the term that best describes automated attack software? A. open-source intelligence B. open-source utility C. intrusion application D. insider software

A. open-source intelligence

Which of the following is not one of the functions of a digital signature? A. protect the public key B. prevention of the sender from disowning the message C. verification of the sender D. prove the integrity of the message

A. protect the public key

According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024? A. 15 B. 18 C. 10 D. 27

B. 18

Which tool is most commonly associated with nation state threat actors? A. Closed-Source Resistant and Recurrent Malware (CSRRM) B. Advanced Persistent Threat (ATP) C. Unlimited Harvest and Secure Attack (UHSA) D. Network Spider and Worm Threat (NSAWT)

B. Advanced Persistent Threat (ATP)

Which of the following ensures that only authorized parties can view protected information? A. Authorization B. Confidentiality C. Availability D. Integrity

B. Confidentiality

Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing? A. Diffusion B. Confusion C. Integrity D. Chaos

B. Confusion

Astrid's computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which time she will receive a means to unlock the files. What type of malware has infected her computer? A. Bitcoin malware B. Crypto-malware C. Blocking virus D. Networked worm

B. Crypto-malware

An organization that practices purchasing products from different vendors is demonstrating which security principle? A. Obscurity B. Diversity C. Limiting D. Layering

B. Diversity

Which of the following is NOT a reason why it is difficult to defend against today's attackers? A. Delays in security updating B. Greater sophistication of defense tools C. Increased speed of attacks D. Simplicity of attack tools

B. Greater sophistication of defense tools

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? A. Trusted Platform Module (TPM) B. Hardware Security Module (HSM) C. Self-encrypting hard disk drives (SED) D. Encrypted hardware-based USB devices

B. Hardware Security Module (HSM)

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? A. Opentext B. Plaintext C. Cleartext D. Ciphertext

B. Plaintext

Which of these is NOT a basic security protection for information that cryptography can provide? A. Authenticity B. Risk loss C. Integrity D. Confidentiality

B. Risk loss

What is the latest version of the Secure Hash Algorithm? A. SHA-2 B. SHA-3 C. SHA-4 D. SHA-5

B. SHA-3

________ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity. A. Encrypted signatures B. Session keys C. Digital certificates D. Digital digests

B. Session keys

Which statement regarding a key logger is NOT true? A. Keyloggers can be used to capture passwords, credit card numbers, or personal information. B. Software key loggers are generally easy to detect. C. Hardware key loggers are installed between the keyboard connector and computer keyboard USB port. D. Software keyloggers can be designed to send captured information automatically back to the attacker through the internet.

B. Software key loggers are generally easy to detect.

_________is following an authorized person through a secure door. A.Tagging B. Tailgating C. Backpacking D. Caboosing

B. Tailgating

What is a race condition? A. When a vulnerability is discovered and there is a race to see if it can be patched before it is exploited by attackers. B. When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences. C. When an attack finishes its operation before antivirus can complete its work. D. When a software update is distributed prior to a vulnerability being discovered.

B. When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.

A watering hole attack is directed against_______? A. wealthy individuals B. a smaller group of specific users C. all users of a large corporation D. attackers who send spam

B. a smaller group of specific users

Each of these is a reason why adware is scorned EXCEPT _______. A. it displays objectionable content B. it displays the attacker's programming skills C. it can interfere with a user's productivity D. it can cause a computer to crash or slow down

B. it displays the attacker's programming skills

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as a virus? A. backdoor B. rootkit C. shield D. wrapper

B. rootkit

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique? A. stealth B. swiss cheese C. appender D. split

B. swiss cheese

Adone is attempting to explain to his friend the relationship between security and convenience. Which of the following statements would he use? A. "Security and convince are not related" B. "Convenience always outweighs security" C. "Security and convenience are inversely proportional." D. "Whenever security and convenience intersect, security always wins."

C. "Security and convenience are inversely proportional."

Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum? A. 2 B. 1 C. 0 D. 16

C. 0

Which of the following is NOT correct about a rootkit? A. A rootlet is able to hide its presence or the presence of other malware. B. A rootkit accesses "lower layers" of the operating system. C. A rootkit is always the payload of a Trojan D. The risk of a rootkit is less today than previously.

C. A rootkit is always the payload of a Trojan

Which of these is the strongest symmetric cryptographic algorithm? A. Data Encryption Standard B. Triple Data Encryption Standard C. Advanced Encryption Standard D. RC 1

C. Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? A. Alice's private key B. Bob's public key C. Alice's public key D. Bob's private key

C. Alice's public key

Linnea's father called her to say that a message suddenly appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before control of the computer will be returned to him. What type of malware is this? A. Persistent virusware B. Trojanware C. Blocking ransomware D. Lockoutware

C. Blocking ransomware

What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments? A. Cyberterrorists B. Competitors C. Brokers D. Resource managers

C. Brokers

Which of the following key exchanges uses the same keys each time? A. Diffie-Hellman-RSA (DHRSA) B. Diffie-Hellman-Ephemeral (DHE) C. Diffie-Hellman (DH) D. Elliptic Curve Diffie-Hellman (ECDH)

C. Diffie-Hellman (DH)

A(n)___________is not decrypted but is only used for comparison purposes. A. Key B. Stream C. Digest D. Algorithm

C. Digest

Hedda pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Hedda performed? A. Aliasing B. Duplicity C. Impersonation D. Luring

C. Impersonation

Lykke receives a call while working at the helpdesk from someone who needs his account reset immediately. When Lykke questions the caller, he says, "If you don't reset my account immediately, I will call your supervisor!" What psychological approach is the caller attempting to use on Lykke? A. Familiarity B. Scarcity C. Intimidation D. Consensus

C. Intimidation

At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why did he say that? A. It is an unproven approach and has never been tested B. It would be too costly to have one isolated server by itself C. It would be essentially impossible to keep its location a secret from everyone D. It depends too heavily upon non-repudiation in order for it to succeed.

C. It would be essentially impossible to keep its location a secret from everyone

Which type of mutation completely changes a virus from its original form by rewriting its own code whenever it is executed? A. Betamorphic B. Oligomorphic C. Polymorphic D. Metamorphic

C. Polymorphic

Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free program to receive weather reports, but the program had also installed malware on the computer that gave the threat actor unrestricted access to the computer. What type of malware had been downloaded? A. Virus B. Ransomware C. RAT D. Trojan

C. RAT

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this? A. AES B. XAND13 C. ROT13 D. Alphabetic

C. ROT13

Which of these is a general term used for describing software that gathers information without the user's consent? A. Gatherware B. Adware C. Spyware D. Scrapware

C. Spyware

Why do cyberterrorists target power plants, air traffic control centers, and water systems? A. These targets are government-regulated and any successful attack would be considered a major victory. B. These targets have notoriously weak security and are easy to penetrate. C. They can cause significant disruption by destroying only a few targets. D. The targets are privately owned and cannot afford high levels of security.

C. They can cause significant disruption by destroying only a few targets.

What is an objective of state-sponsored attackers? A. To right a perceived wrong B. To amass fortune over of fame C. To spy on citizens D. To sell vulnerabilities to the highest bidder

C. To spy on citizens

Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide? A. Verify the sender B. Prove the integrity of the message C. Verify the receiver D. Enforce nonrepudiation

C. Verify the receiver

Tatyana is discussing with her supervisor potential reasons why a recent attack was successful against one of their systems. Which of the following configuration issues would NOT be covered? A. Default configurations B. Weak configurations C. Vulnerable business processes D. Misconfigurations

C. Vulnerable business processes

What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain? A. phishing B. cyberterrorism C. identity theft D. social scam

C. identity theft

What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals? A. phreaking B. hacking C. social engineering D. reverse engineering

C. social engineering

What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company? A. adware B. typo Squatting C. watering hole D. spam

C. watering hole

Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? A. $50,000 B. $250,000 C. $500,000 D. $1,500,000

D. $1,500,000

In information security, which of the following is an example of a threat actor? A. a person attempting to break into a secure computer network. B. A virus that attacks a computer network C. A force of nature such as a tornado that could destroy computer equipment. D. All of the above

D. All of the above

When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash? A. Alice's private key B. Bob's private key and Alice's public key. C. Bob and Alice's keys. D. Bob's private key

D. Bob's private key

Which of these items through dumpster diving would NOT provide useful information? A. Calendars B. Organizational charts C. Memos D. Books

D. Books

Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted? A. Electronic Code Book (ECB) B. Galios/Counter (GCM) C. Counter (CTR) D. Cipher Block Chaining (CBC)

D. Cipher Block Chaining (CBC)

What entity calls in crypto modules to perform cryptographic tasks? A. Certificate Authority (CA) B. OCSP Chain'' C. Intermediate CA D. Crypto service provider

D. Crypto service provider

Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information? A. Sarbanes-Oxley Act (Sarbox) B. Financial and Personal Services C. Health Insurance Portability and Accountability(HIPPA) D. Gramm-Leach-Bliley Act (GLBA)

D. Gramm-Leach-Bliley Act (GLBA)

Which areas of a file cannot be used by steganography to hide data? A. In areas that contain the content data itself B. In the file header fields that describe the file C. In data that is used to describe the content or structure of the actual data D. In the directory structure of the file system

D. In the directory structure of the file system

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation? A. Large number of vulnerabilities B. End-of-life systems C. Lack of vendor support D. Misconfigurations

D. Misconfigurations

What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages? A. GNUPG B. EFS C. GPG D. PGP

D. PGP

Which of the following is NOT a successive layer in which information security is achieved? A. Products B. People C. Procedures D. Purposes

D. Purposes

Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose? A. SHA-2 B. ME-312 C. BTC-2 D. RSA

D. RSA

What are industry-standard framework and reference architectures that are required by external agencies known as? A. Compulsory B. Mandatory C. Required D. Regulatory

D. Regulatory

Which of the following is NOT true regarding security? A. Security is a goal. B. Security includes the necessary steps to protect from harm. C. Security is a process D. Security is a war that must be won at all costs.

D. Security is a war that must be won at all costs.

Which of these could NOT be defined as a logic bomb? A. If the company's stock price drops below $100, then credit Juni's account with 10 additional years of retirement credit. B. Erase all data if Matilda's name is removed from the list of employees. C. Reformat the hard drive three months after Sigrid has left the company. D. Send spam email to Moa's inbox on Tuesday.

D. Send spam email to Moa's inbox on Tuesday.

Which of the following is NOT a method for strengthening a key? A. Randomness B. Cryptoperiod C. Length D. Variability

D. Variability

Which type of malware requires a user to transport it from one computer to another? A. Worm B. Rootkit C. Adware D. Virus

D. Virus

What type of ransomware displays a screen and prevents the user from accessing the computer's resources? A. standard ransomware B. locking-malware C. crypto-malware D. blocker ransomware

D. blocker ransomware

What term describes a layered security approach that provides the comprehensive protection? A. defense-in-depth B. limiting-defense C. comprehensive-security D. diverse-defense

D. diverse-defense

Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information _____. A.on electronic digital devices and limited analog devices that can connect via the Internet or through a local area network. B. through a long-term process that results in ultimate security C. using both open-sourced as well as supplier-sourced hardware and software that interacts appropriately with limited resources. D. through products, people, and procedures on the devices that store, manipulate and transmit the information.

D. through products, people, and procedures on the devices that store, manipulate and transmit the information.

A polymorphic virus changes its internal code to one of a set number of predefined mutations whenever it is executed. True or False?

False

A rootkit can hide its presence, but not the presence of other malware. True or False?

False

As security is increased, convenience is often increased. True or False?

False

Asymmetric cryptographic algorithms are also known as private key cryptography. True or False?

False

Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties. True or False?

False

Malware is software that enters a computer system with the user's knowledge or consent and then performs an unwanted and harmful action. True or False?

False

One of the first popular symmetric cryptography algorithms was RSA. True or False?

False

Smart phones give the owner of the device the ability to download security updates. True or False?

False

Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses. True or False?

False

The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information. True or False?

False

Vishing is a false warning, often contained in an email message claiming to come from the IT department. True or False?

False

A collision attack is an attempt to find two input strings of a hash function that produce the same hash result. True or False?

True

A vulnerability is a flaw or weakness that allows a threat to bypass security. True or False?

True

In information technology, non-repudiation is the process of proving that a user performed an action. True or False?

True

Obfuscation is making something well known or clear. True or False?

True

One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government. True or False?

True

Social engineering impersonation means to masquerade as a real or fictitious character and then play out the role of that person on a victim. True or False?

True

The CompTIA Security+ certification is a vendor-neutral credential. True or False?

True

To mitigate risk is the attempt to address risk by making the risk less serious. True or False?

True


Ensembles d'études connexes

BS Chapter 12 - Business Planning & Functional Strategies

View Set

Ch. 40 Fluid, Electrolyte, and Acid-Base Balance

View Set

UMD HLTH 2030 Human Anatomy & Physiology

View Set