1.3_ Certifications and Security+ Flashcards

1
Q

What are some jobs that may require the Security+ certification?

A
Security Architect
Security Engineer
Security Consultant
Security Specialist
Information Security Analyst
Security Administrator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As of December 2019, what was the average annual pay for an information security analyst?

A

$98,735

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many topics are in the Secuirty+ exam?

A
There are 6:
1. Threats, Attacks and Vulnerabilities (21%)
2 .Technology and Tools (22%)
3. Architecture and Design (15%)
4. Identity and Access Management (16%)
5. Risk Access Management (14%)
6. Cryptography and PKI (12%)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following describes a logic bomb?

  1. A program that performs a malicious activity at a specifictime or after triggering an event.
  2. A type of malicious code similar to a virus whose
    primary purpose is to duplicate itself, and spread
    while not necessarily internally damaging or destroying resources.
  3. A program that appears to be a legitimate application,
    utility, game or screen saver that performs malicious activities surreptitiously.
  4. A program that has no useful purpose, but attempts
    to spread itself to other systems and often damages resources on the system where it is found.
A
  1. A program that performs a malicious activity at a specifictime or after triggering an event.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scenario: You are responsible for security at a small
organization and have been tasked with implementing a
security policy. Place the actions of organizing a security
policy in their appropriate order. Note that there are five
options, but you need to choose four.

A

Step 1: Obtain support and commitment from management
Step 2: Analyze risks to security Implement appropriate controls
Step 3: Implement appropriate controls
Step 4: Review, test, and update procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Of vulnerability, threat, or exploit, and risk, which would be assessed by the likelihood and impact?

  1. Vulnerability
  2. Risk
  3. Threat
  4. Exploit
A
  1. Risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name all 5 Threat Actors

A
  • The Lone Hacker (Black Hat / Script kiddies)
  • Organized Cyber Crimes
  • Nation State
  • Hacktivist
  • Competitor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s the difference between a virus and a worm?

A

Viruses are programs that copies itself onto another computer system and need to be executed, whereas a worm does not need to attach itself to an executable file and instead can replicate over network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three ways viruses can damage the infected hosts?

A
  1. Slowing down the host by using up a computer’s resources, such as CPU and RAM.
  2. Denial of Service Attacks (DoS): Shutting down the host by using up all of its resources or destroying essential files.
  3. Ransomware “Scrambling” data on the host so that users can’t read it, and demanding money to “unscramble” it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False:

All virus types need to infect a host, which can be distributed in a number of ways, such as on a disk, a network, or as an email or message attachment.

A

True

For example, email attachment viruses, which are usually a program or macro viruses hosted in an attached file, can use the infected victim’s list of email contacts to spoof the sender’s address when replicating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False:

A virus can have a payload that executes when the virus is activated. The payload can perform any action available to the host process.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Worm?

A

A worm is a self-replicating program. It is considered a memory-resident virus. A worm does not need to attach itself to an executable file and instead can replicate over network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False:

A worm attaches itself to a host.

A

False

A virus attaches itself to a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False:

Once on a computer, a worm does not need human interaction.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False:

A virus automatically. replicates itself and can travel
across computer networks without human interaction.

A

False

A worm automatically. replicates itself and can travel
across computer networks without human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False:

A worm is known for having .bat file extension interaction.

A

False

A virus is known for having .bat file extension interaction.

17
Q

Since viruses and worms are merely programming scripts, is every OS vulnerable?

A

YES

18
Q

Is a virus self-replicating?

A

NO

19
Q

What is a trojan?

A

A Trojan is a program that typically hides within something else. They can be embedded within a downloadable object, such as a game or screensaver.

20
Q

What does RAT stand for and what is it?

A

Remote Access Trojans (RAT) function as backdoor applications. Once this Trojan backdoor is installed, the attacker can access the victim’s computer and install files and software on it.

• The RAT needs to establish a covert channel from the victim’s host to a Command and Control (C2 or C&C) host or network operated by the attacker. Identifying a network connection is usually the best indicator that a RAT has compromised a victim’s computer.

21
Q

What is botonets?

A

Botnets are two or more zombie computers that are remotely controlled by an attacker.

22
Q

What does zombie refer to?

A

When the attacker is able to send remote commands to the victim’s computer, the computer is called a zombie. This can be used for many purposes, such as downloading additional malicious programs.

23
Q

A program that gains a foothold into the victim’s system, and can be installed with or without the user’s knowledge, monitoring user activity and send the information to an external source is called what?

A

Spyware

24
Q

Explain Keyloggers?

A

Keyloggers actively attempt to steal confidential information by capturing the keystrokes of the victim. Keyloggers are considered a type of spyware, as they are hidden on the remote computer system and used to discreetly capture the victims information.

25
Q

What is Adware?

A

Adware is any type of software or browser plugin that displays or downloads advertisements via pop-ups. Some can act like spyware, for example, by tracking websites that a user visits.

26
Q

Ture or False:

Programmers create backdoors in software application for testing and development, but do not always remove them when the application is deployed.

A

True

27
Q

What are rootkits?

A

Rootkits are a type of backdoor that are more difficult to detect and remove. They remain undetected by:

  • Changing core system files and programming interfaces. The local shell processes can’t show their presence if run from an infected machine.
  • Using tools that clean system logs.
28
Q

These are installed into the kernel of an operating system, which means that they can infect a machine through a corrupted device driver or kernel patch.

A

Rootkits

While less effective, some rootkits can operate in user mode, meaning that they can replace key utilities or less-privileged drivers.

29
Q

What’s the difference between vulnerabilities and exploits?

A

Vulnerabilities are weaknesses that can be exploited by an attacker.

Exploits are how actors attack computer systems.

30
Q

Risks can include what known kept vulnerabilities?

A

Risks can include known kept vulnerabilities.

  • These vulnerabilities are kept because it would either cost the business too much to protect against them, or the business would not be able to operate without the risk.
  • Risks can be reduced, but it’s impossible to fully remove all risks in an organization.
  • Organizations have a formula to calculate risks: Risk = Likelihood × Impact.
31
Q

What does APT stand for?

A

Advanced Persistent Threat (APT)

32
Q

Which of the following is a type of a classic virus that infects executable files, and upon execution of an infected file, infects other files.

  1. Macro viruses
  2. Metamorphic viruses
  3. File-infecting or classic viruses
  4. Crypto-malware
A
  1. File-infecting or classic viruses
33
Q

a rootkit is a particularly dangerous type of malware. What makes it so dangerous?

  1. It takes control of a system at the lowest levels while
    attempting to hide from detection.
  2. It attaches to files and spread from one computer to another.
  3. It generates unsolicited advertisements that direct users to sites infected with malware.
  4. It records all keystrokes made by a user, exposing that user’spasswords.
A
  1. It takes control of a system at the lowest levels while

attempting to hide from detection.