SEC Final

Ace your homework & exams now with Quizwiz!

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

a type of ransomware

What does the term vulnerability mean?

a weakness that makes a target susceptible to an attack?

What is the term used to describe an email that is targeting a specific person employed at a financial institution?

spear phishing

A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?

spyware

Which three processes are examples of logical access controls?

firewalls to monitor traffic biometrics to validate physical characteristics intrusion detection system (IDS) to watch for suspicious network activity

What are three validation criteria used for a validation rule?

format range size

What is identified by the first dimension of the cybersecurity cube?

goals

What name is given to hackers who hack for a cause?

hactivist

Which two methods help to ensure data integrity?

hashing data consistency checks

What are the three states of data?

in-process at rest in-transit

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Analyze

A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?

Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded

What is the step by step process for creating a digital signature?

Create a message digest; encrypt the digest with the private key of the sender; and bundle the message, encrypted digest, and public key together in order to sign the document

A user has been asked to implement IPsec for inbound external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integrity and authenticity of the connection. What security tool can the user use?

HMAC

Identify three situations in which the hashing function can be applied.

IPsec CHAP PHI

What does the acronym IoE represent?

Internet of Everything

What is a strength of using a hashing function?

It is a one-way function and not reversible

What is an example of an internet data domain?

Linkedin

What name is given to a storage device connected to a network?

NAS

Which three protocols use asymmetric key algorithms?

Pretty Good Privacy (PGP) Secure Sockets Layer (SSL) Secure Shell (SSH)

What are three NIST-approved digital signature algorithms?

RSA ECDSA DSA

A user is connecting to an e-commerce server to buy some widgets for a company. The user connects to the site and notices there is no lock in the browser security status bar. The site does prompt for a username and password and the user is able to log in. What is the danger in proceeding with this transaction?

The site is not using a digital certificate to secure the transaction, with the result that everything is in the clear.

What is a secure virtual network called that uses the public network?

VPN

What service determines which resources a user can access along with the operations that a user can perform?

authorization

What are the three foundational principles of the cybersecurity domain?

availability, confidentiality integrity

What is the name given to a program or program code that bypasses normal authentication?

backdoor

An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?

bluesnarfing

What does the term BYOD represent?

bring your own device

Which method tries all possible passwords until a match is found?

brute force

Three types of sensitive information?

classified business PII

What principle prevents the disclosure of information to unauthorized people, resources, and processes?

confidentiality

social steganography

creating a message that says one thing but means something else to a specific audience

What is the term used to describe the science of making and breaking secret codes?

cryptology

What three tasks are accomplished by a comprehensive security policy?

defines legal consequences of violations sets rules for expected behavior gives security staff the backing of management

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

deterrent

A user downloads an updated driver for a video card from a website. A warning message pops up saying the driver is not approved. What does this piece of software lack?

digital signature

Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?

smishing

What is a method of sending information from one device to another using removable media?

sneaker net

hiding data within an audio file

stenography

What type of cipher encrypts plaintext one byte or one bit at a time?

stream

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

symmetric

An investigator finds a USB drive at a crime scene and wants to present it as evidence in court. The investigator takes the USB drive and creates a forensic image of it and takes a hash of both the original USB device and the image that was created. What is the investigator attempting to prove about the USB drive when the evidence is submitted in court?

the data in the image is not an exact copy and nothing has been altered by the process

What are two common indicators of spam mail?

the email has misspelled words or punctuation errors or both the email has no subject line

Which two reasons describe why WEP is a weak protocol?

the key is static and repeats on a congested network the key is transmitted in clear text

What is the purpose of CSPRNG?

to generate salt

What is the name of the method in which letters are rearranged to create the ciphertext?

transposition

What two methods help to ensure system availability?

up-to-date operating systems equipment maintenance

What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target?

urgency intimidation

What mechanism can organizations use to prevent accidental changes by authorized users?

version control

What is the difference between a virus and a worm?

worms self-replicate but viruses do not

What is the standard for a public key infrastructure to manage digital certificates?

x.509

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

cross-site scripting

What type of attack targets an SQL database using the input field of a user?

cross-site scripting

A recent email sent throughout the company stated that there would be a change in security policy. The security officer who was presumed to have sent the message stated the message was not sent from the security office and the company may be a victim of a spoofed email. What could have been added to the message to ensure the message actually came from the person?

digital signature

steganalysis

discovering that hidden information exists within a graphic file

Three types of records that cyber criminals would be interested in stealing from organizations.

education employment medical

What three design principles help to ensure high availability?

eliminate single points of failure provide for reliable crossover detect failures as they occur

A user is the database administrator for a company. The user has been asked to implement an integrity rule that states every table ​must have a primary key and that the column or columns chosen to be the primary key must be unique and not null. Which integrity requirement is the user implementing?

entity integrity

For the purpose of authentication, what three methods are used to verify identity?

something you are something you know something you have

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

steganography

The CEO of a company is concerned that if a data breach should occur and customer data is exposed, the company could be sued. The CEO makes the decision to buy insurance for the company. What type of risk mitigation is the CEO implementing?

transference

Which term describes the technology that protects software from unauthorized access or modification?

watermarking

A user is asked to create a disaster recovery plan for a company. The user needs to have a few questions answered by management to proceed. Which three questions should the user ask management as part of the process of creating the plan?

where does the individual perform the process? what is the process? who is responsible for the process?

A user was hired as the new security officer. One of the first projects was to take inventory of the company assets and create a comprehensive database. Which three pieces of information would the user want to capture in an asset database?

workstations operating systems hardware network devices

What are two ways to protect a computer from malware?

keep software up to date use antivirus software

Which two terms are used to describe cipher keys?

key length key space

A user is redesigning a network for a small company and wants to ensure security at a reasonable price. The user deploys a new application-aware firewall with intrusion detection capabilities on the ISP connection. The user installs a second firewall to separate the company network from the public network. Additionally, the user installs an IPS on the internal network of the company. What approach is the user implementing?

layered

Which three devices represent examples of physical access controls?

locks swipe cards video cameras

What are three type of attacks that are preventable through the use of salting?

lookup tables rainbow tables reverse lookup tables

obfuscation

making a message confusing so it is harder to understand

What term is used to describe the technology that replaces sensitive information with a nonsensitive version?

masking

What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?

modification

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

phishing

What are three examples of administrative access controls?

policies and procedures background checks hiring practices

A recent breach at a company was traced to the ability of a hacker to access the corporate database through the company website by using malformed data in the login form. What is the problem with the company website?

poor input validation

A security breach has happened at a major corporation. The incident team has responded and executed their incident response plan. During which phase are lessons learned applied?

post-incident

A team has been asked to create an incident response plan for security incidents. In what phase of an incident response plan does the team get management approval of the plan?

preparation

What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

privacy

What does a rootkit modify?

programs

A user is asked to perform a risk analysis of a company. The user asks for the company asset database that contains a list of all equipment.The user uses this information as part of a risk analysis. Which type of risk analysis could be performed?

quantitative

Alice and Bob use the same password to login into the company network. This means both would have the exact same hash for their passwords. What could be implemented to prevent both password hashes from being the same?

salting

What name is given to a amateur hacker?

script kiddie

A user is instructed by a boss to find a better method to secure passwords in transit. The user has researched several means to do so and has settled on using HMAC. What are the key elements needed to implement HMAC?

secret key and message digest

Thwarting cyber criminals includes which of the following?

sharing cyber intelligence information establishing early warning signs

What occurs on a computer when data goes beyond the limits of a buffer?

a buffer ovweflow

What is the meaning of the term logic bomb?

a malicious program that uses a trigger to awaken the malicious code

Two methods to ensure confidentiality

authentication encryption

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

asyymmetric

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

AES

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DDoS

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

Diffie-Hellman

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

ECC

A user is evaluating the security infrastructure of a company and notices that some authentication systems are not using best practices when it comes to storing passwords. The user is able to crack passwords very fast and access sensitive data. The user wants to present a recommendation to the company on the proper implementation of salting to avoid password cracking techniques. What are three best practices in implementing salting?

a salt should not be reused a salt must be unique a salt should be unique for each password

What is the name for the type of software that generates revenue by generating annoying pop-ups?

adware

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

algorithm

What are two common hash functions?

MD5 SHA

A user is running a routine audit of the server hardware in the company data center. Several servers are using single drives to host operating systems and multiple types of attached storage solutions for storing data. The user wants to offer a better solution to provide fault tolerance during a drive failure. Which solution is best?

RAID

Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?

block

A user was hired by a company to provide a highly available network infrastructure. The user wants to build redundancy into the network in case of a switch failure, but wants to prevent Layer 2 looping. What would the user implement in the network?

Spanning Tree Protocol

Three access control security services?

authorization authentication accounting


Related study sets

REGION 1, CAR, REGION 2, REGION 3, NCR

View Set

Unit 1 - Individual Securities - Equities

View Set

Pharm Study Guide (Management of ST-Elevation Myocardial Infarction) Ch 53

View Set