Chapter 1-10

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What was the first search engine created in 1990 by Alan Emtage?

Archie

Match the term on the left to the definition on the right:

Availability attack - Attack that prevents access Confidentiality attack - Attack that extracts information Integrity attack - Attack that changes the information

Edward Snowden worked for which contractor before he started his whistleblowing campaign against the NSA?

Booz Allen Hamilton

____________________ was considered one of the biggest military cyber security breaches. It involved a servicemember putting a USB he had found in a parking lot into his government computer.

Buckshot Yankee

Who is the top cyber security expert in an organization?

CISO

You would typically hear a _______________ say, "Fail to plan. Plan to Fail." From Meeuwisse's book.

Cybersecurity Architect

What government agency developed the Advanced Research Projects Agency Network (ARPANET)?

Department of Defense

Sony was attacked due to the release of a movie, what was the title of the movie?

The Interview

Cyber attackers mainly fall into 8 groups. These include: Nation States, Terrorist Groups, Organized Criminal Groups, Hacktivists, Skilled Professional Hackers, Opportunistic Insiders, Amateur Hackers and anyone!

True

There is a fine line between hacktivism and cyber terrorism.

True

In this country, the only Internet service provider is the government. It blocks access to many sites and monitors all e-mail accounts in Gmail, Yahoo and Hotmail

Turkmenistan

The very first step in the attack on Target appears to have an attack on a subcontractor. It is believed that the thieves used a _____________ to steal the identity of the supplier's permission credentials.

botnet

John the Ripper and THC Hydra are used to what?

crack-passwords.-password-cracking

A ________________ is a protective layer between your computer and the internet?

firewall

One documented case of cyber terrorism was the ________________.

not stuxnet

List the three types of networks discussed in the slides for this module:

wide-area--local-area--peer-to-peer WAN--LAN--P2P

Who was interviewed in the Nova video?

Edward Snowden

__________ is an independent agency in the US government created by statutes to regulate interstate communications by radio, television, wire, satellite, and cable.

FCC

A DDOS attack that took down a network is an example of the confidentiality principle in the CIA Triad

False

An Advanced Persistent Threat (APT) attack is more opportunistic than targeted.

False

As information technology grows, the number of cybercrimes is decreasing.

False

Just as a street address determines where mail should be delivered, a _________ address identifies computers on the internet.

IP

List 3 of the 8 most common cyber attacks (from the module slides):

Malware Phishing password attack

Two rather large and far-reaching security flaws found back in late 2017 are known as:

Meltdown & Spectre

The CIA Triad is best described as:

Model designed to guide policies for information security within an organization

Admiral Rogers in the video was in charge of what US government office until May 2018?

NSA

____________ __________is the internet's guiding principle: "It preserves our right to communicate freely online.

Net neutrality

Who was apparently the attackers in the "Estonian cyberwar"?

Patriotic hackers from Russia

From the outside reading on HBGary Federal, what was the considered the worst outcome from the attack?

Reputation of the company

Which country has allegedly hacked the United States Elections?

Russia

British intelligence reportedly replaced instructions in a terrorist magazine with what?

A cupcake recipe

The attack surface is referred to as the target area. According to Cybersecurity for Beginners, there are ___________ cyber defense points and __________ major categories in the cyber attack surface.

6, 6

The group known as Anonymous is an example of:

Hacktivists

Which one of the following is an example of a disruptive cyberattack?

Hacktivists defacing a government website


Set pelajaran terkait

hlrn 311 human learning final chap 1-5

View Set

Programming Test I Review (Practices 2-6)

View Set

Chapter 11: The Healthcare Delivery System

View Set

LabCE Course - Red Cell Disorders: Peripheral Blood Clues to Nonneoplastic Conditions

View Set

International Business: The International Business Environment

View Set

Module 2 - Electronic Components (Question Sheet)

View Set

Peristiwa-peristiwa sekitar proklamasi dan proses terbentuknya Negara Kesatuan Republik Indonesia

View Set