Module 1 Review Questions, Power Point Module 1 Intro. to Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

most commonly associated with state actors

APT attacks

three types of protection

CIA Triad

Which of the following ensures that only authorized parties can view protected information?

Confidentiality

CIA triad

Confidentiality, Integrity, Availability

Unsecure protocols are classified as which type of vulnerability?

Configuration vulnerability

Luna is reading a book about the history of cybercrime. She read that the very first cyberattacks were mainly for what purpose?

Fame

What is it called when a threat actor takes information for the purpose of impersonating someone?

Identity theft

Which of the following of the CIA Triad ensures that information is correct, and no unauthorized person has altered it?

Integrity

Which of the following is not used to describe those who attack computer systems?

Malicious agent

Which of the following is not a reason a legacy platform has not been updated?

No compelling reason for any updates

Which of the following is not an issue with patching?

Patches address zero-day vulnerabilities

Which of the following is false about the CompTIA Security+ certification?

Professionals who hold the Security+ certification earn about the same or slightly less than security professionals who have not achieved this certification

MegaCorp is a multinational enterprise. Their customer payment files were recently stolen and sold on the black market. Customers have reported that their credit cards are being charged for fraudulent purchases made in countries where they do not live and have never been. What is the most likely impact on MegaCorp from this attack?

Reputation loss

Which of the following groups have the lowest level of technical knowledge?

Script kiddies

Which of the following is true regarding the relationship between security and convenience?

Security and convenience are inversely proportional.

Which of the following is not true regarding security?

Security is a war that must be won at all costs

Which of the following groups use advanced persistent threats?

State actors

What is the term used to describe the connectivity between an organization and a third party?

System integration

Over the last few years, an organization has brought up the need to replace old systems. While the organization has made these old systems function with various workarounds, custom middleware applications, and other methods to make up for their shortcomings, it has become increasingly apparent that they need to be replaced soon.

The age of the systems means they run on outdated OSs that are no longer supported, making security updates impossible to install.

How do vendors decide which should be the default settings on a system?

Those settings that provide the means by which the user can immediately begin to use the product

Complete this definition of information security

Through products, people, and procedures on the devices that store, manipulate, and transmit the information.

Which type of hacker will probe a system for weaknesses and then privately provide that information back to the organization?

White hat hackers

Which tool is most commonly associated with state actors?

advanced persistent threat

Which of the following describes state actors using advanced tools to infect a system to silently and slowly extract data?

advanced persistent threat (APT)

multilayer intrusion campaigns targeting highly sensitive economic, proprietary, or national security information

advanced persistent threat (APT)

pathway or avenue used by threat actor to penetrate a system

attack vector

three types of hackers

black hat, white hat, and gray hat

types of attacks made by hacktivist

breaking into a website and changing its contents as a means of a political statement

sell their knowledge of a weakness to other attackers or governments

brokers

zero day vulnerabilities

can be exploited by attackers before anyone knows it exists, zero days of warning, extremely serious

launch attacks against an opponent's system to steal classified information

competitors

system that consists of the hardware device and an operating system that runs software

computer platform

as security is increased

convenience is decreased

move from traditional criminal activities to more rewarding and less risky online attacks

criminal syndicates

Recently, a computerized electrical power supply unit failed due to a cyberattack. This resulted in a power grid disruption for an entire region of the country. In your study on the attack, how should you categorize the threat actor(s)?

cyberterrorist

attack a nation's network and computer infrastructure to cause disruption and panic among citizens

cyberterrorists

patch vulnerabilities

difficulty patching firmware, few patches for application software, delays in patching operating systems

attack vector general categories

email, wireless, removable media, direct access, social media, supply chain, cloud

availability

ensures information is accessible to authorized users

integrity

ensures information is correct and unaltered

as security increases, the convenience of using a system is also increased

false

individuals that are strongly motivated by ideology (for the sake of their principles or beliefs)

hacktivist

Which of the following is a social engineering attack that uses social media and other sources to achieve its goal?

hybrid warfare influence campaign

financial crime is often divided into three categories based on targets

individual users, enterprises, governments

describes the tasks of securing digital information

information security

employees, contractors, and business partners can pose an insider threat of manipulating data from the position of a trusted employee

insiders

focus of the insiders

intellectual property (IP) theft, sabotage, espionage

platform vulnerabilities

legacy platforms, on-premises platforms, cloud platforms

tasks of securing digital information

manipulated by microprocessor preserved on storage device transmitted over network

Which of the following is not a recognized attack vector?

on-prem

confidentiality

only approved individuals may access information

sending email message or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrender private information or taking action

phishing

cybersecurity vulnerabilities can be categorized into

platforms, third parties, patches, and ero day vulnerabilities

if configuration settings are not properly implemented

results in weak configurations

individuals who want to perform attacks, yet lack technical knowledge to carry them out, they download freely available automated attack software and use it to attack

script kiddies

After Bella earned her security certification, she was offered a promotion. As she reviewed the job responsibilities, she saw that in this position she will report to the CISO and supervise a group of security technicians. Which of these generally recognized security positions has been offered?

security manager

A threat actor employed by the victimized organization is referred to as which of the following?

shadow IT

employees become frustrated with the slow pace of acquiring technology, so they purchase and install their own equipment or resources in violation of company policies

shadow IT

means of eliciting information by relying on the weakness of individuals

social engineering

one of the most successful types of attack is

social engineering

what type of threat actor is often involved in multiyear intrusion campaigns targeting highly sensitive economic, proprietary, or national security information

state actor

deadliest of any threat actors

state actors

government are increasingly employing their own state-sponsored attackers for launching cyberattacks against their foes

state actors

the more secure something is

the less convenient it may become to use

an individual or entity responsible for cyber incidents against the technology equipment of enterprises and users, generic term attacker is commonly used

threat actor

what is the goal of security?

to be free from danger

What is an objective of state-sponsored attackers?

to spy on citizens

A weakest link vulnerability can be caused by mismanagement of which of the following?

vendor management

state of being exposed to the possibility of being attacked or harmed

vulnerability

Your company's Accounts Payable department reports that an invoice was marked as paid, but the vendor has shown proof they never received any of the $783,296 payment. Accounts Payable confirms that the amount was deducted from the company's accounts, but the recipient account number does not match the vendor's. After an investigation, you discover that the invoice was paid by the Chief Financial Officer. He says he paid the invoice after receiving an after-hours, past-due invoice from the vendor claiming that they would be filing a civil action in court the next morning. Rather than wait for Accounts Payable to come in the next day and verify the invoice date, the CFO immediately paid the full amount.

whaling

to be free from danger and the process that achieves that freedom

what is security


संबंधित स्टडी सेट्स

Objective 10: Prepare an organized, developed analysis on a topic related to foundations of reading development, development of reading comprehension; reading assessment and instruction.

View Set

Ch 22 Bonding in Ionic Compounds

View Set