Module 1 Review Questions, Power Point Module 1 Intro. to Security
most commonly associated with state actors
APT attacks
three types of protection
CIA Triad
Which of the following ensures that only authorized parties can view protected information?
Confidentiality
CIA triad
Confidentiality, Integrity, Availability
Unsecure protocols are classified as which type of vulnerability?
Configuration vulnerability
Luna is reading a book about the history of cybercrime. She read that the very first cyberattacks were mainly for what purpose?
Fame
What is it called when a threat actor takes information for the purpose of impersonating someone?
Identity theft
Which of the following of the CIA Triad ensures that information is correct, and no unauthorized person has altered it?
Integrity
Which of the following is not used to describe those who attack computer systems?
Malicious agent
Which of the following is not a reason a legacy platform has not been updated?
No compelling reason for any updates
Which of the following is not an issue with patching?
Patches address zero-day vulnerabilities
Which of the following is false about the CompTIA Security+ certification?
Professionals who hold the Security+ certification earn about the same or slightly less than security professionals who have not achieved this certification
MegaCorp is a multinational enterprise. Their customer payment files were recently stolen and sold on the black market. Customers have reported that their credit cards are being charged for fraudulent purchases made in countries where they do not live and have never been. What is the most likely impact on MegaCorp from this attack?
Reputation loss
Which of the following groups have the lowest level of technical knowledge?
Script kiddies
Which of the following is true regarding the relationship between security and convenience?
Security and convenience are inversely proportional.
Which of the following is not true regarding security?
Security is a war that must be won at all costs
Which of the following groups use advanced persistent threats?
State actors
What is the term used to describe the connectivity between an organization and a third party?
System integration
Over the last few years, an organization has brought up the need to replace old systems. While the organization has made these old systems function with various workarounds, custom middleware applications, and other methods to make up for their shortcomings, it has become increasingly apparent that they need to be replaced soon.
The age of the systems means they run on outdated OSs that are no longer supported, making security updates impossible to install.
How do vendors decide which should be the default settings on a system?
Those settings that provide the means by which the user can immediately begin to use the product
Complete this definition of information security
Through products, people, and procedures on the devices that store, manipulate, and transmit the information.
Which type of hacker will probe a system for weaknesses and then privately provide that information back to the organization?
White hat hackers
Which tool is most commonly associated with state actors?
advanced persistent threat
Which of the following describes state actors using advanced tools to infect a system to silently and slowly extract data?
advanced persistent threat (APT)
multilayer intrusion campaigns targeting highly sensitive economic, proprietary, or national security information
advanced persistent threat (APT)
pathway or avenue used by threat actor to penetrate a system
attack vector
three types of hackers
black hat, white hat, and gray hat
types of attacks made by hacktivist
breaking into a website and changing its contents as a means of a political statement
sell their knowledge of a weakness to other attackers or governments
brokers
zero day vulnerabilities
can be exploited by attackers before anyone knows it exists, zero days of warning, extremely serious
launch attacks against an opponent's system to steal classified information
competitors
system that consists of the hardware device and an operating system that runs software
computer platform
as security is increased
convenience is decreased
move from traditional criminal activities to more rewarding and less risky online attacks
criminal syndicates
Recently, a computerized electrical power supply unit failed due to a cyberattack. This resulted in a power grid disruption for an entire region of the country. In your study on the attack, how should you categorize the threat actor(s)?
cyberterrorist
attack a nation's network and computer infrastructure to cause disruption and panic among citizens
cyberterrorists
patch vulnerabilities
difficulty patching firmware, few patches for application software, delays in patching operating systems
attack vector general categories
email, wireless, removable media, direct access, social media, supply chain, cloud
availability
ensures information is accessible to authorized users
integrity
ensures information is correct and unaltered
as security increases, the convenience of using a system is also increased
false
individuals that are strongly motivated by ideology (for the sake of their principles or beliefs)
hacktivist
Which of the following is a social engineering attack that uses social media and other sources to achieve its goal?
hybrid warfare influence campaign
financial crime is often divided into three categories based on targets
individual users, enterprises, governments
describes the tasks of securing digital information
information security
employees, contractors, and business partners can pose an insider threat of manipulating data from the position of a trusted employee
insiders
focus of the insiders
intellectual property (IP) theft, sabotage, espionage
platform vulnerabilities
legacy platforms, on-premises platforms, cloud platforms
tasks of securing digital information
manipulated by microprocessor preserved on storage device transmitted over network
Which of the following is not a recognized attack vector?
on-prem
confidentiality
only approved individuals may access information
sending email message or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrender private information or taking action
phishing
cybersecurity vulnerabilities can be categorized into
platforms, third parties, patches, and ero day vulnerabilities
if configuration settings are not properly implemented
results in weak configurations
individuals who want to perform attacks, yet lack technical knowledge to carry them out, they download freely available automated attack software and use it to attack
script kiddies
After Bella earned her security certification, she was offered a promotion. As she reviewed the job responsibilities, she saw that in this position she will report to the CISO and supervise a group of security technicians. Which of these generally recognized security positions has been offered?
security manager
A threat actor employed by the victimized organization is referred to as which of the following?
shadow IT
employees become frustrated with the slow pace of acquiring technology, so they purchase and install their own equipment or resources in violation of company policies
shadow IT
means of eliciting information by relying on the weakness of individuals
social engineering
one of the most successful types of attack is
social engineering
what type of threat actor is often involved in multiyear intrusion campaigns targeting highly sensitive economic, proprietary, or national security information
state actor
deadliest of any threat actors
state actors
government are increasingly employing their own state-sponsored attackers for launching cyberattacks against their foes
state actors
the more secure something is
the less convenient it may become to use
an individual or entity responsible for cyber incidents against the technology equipment of enterprises and users, generic term attacker is commonly used
threat actor
what is the goal of security?
to be free from danger
What is an objective of state-sponsored attackers?
to spy on citizens
A weakest link vulnerability can be caused by mismanagement of which of the following?
vendor management
state of being exposed to the possibility of being attacked or harmed
vulnerability
Your company's Accounts Payable department reports that an invoice was marked as paid, but the vendor has shown proof they never received any of the $783,296 payment. Accounts Payable confirms that the amount was deducted from the company's accounts, but the recipient account number does not match the vendor's. After an investigation, you discover that the invoice was paid by the Chief Financial Officer. He says he paid the invoice after receiving an after-hours, past-due invoice from the vendor claiming that they would be filing a civil action in court the next morning. Rather than wait for Accounts Payable to come in the next day and verify the invoice date, the CFO immediately paid the full amount.
whaling
to be free from danger and the process that achieves that freedom
what is security