1.3_ Certifications and Security+ Flashcards
What are some jobs that may require the Security+ certification?
Security Architect Security Engineer Security Consultant Security Specialist Information Security Analyst Security Administrator
As of December 2019, what was the average annual pay for an information security analyst?
$98,735
How many topics are in the Secuirty+ exam?
There are 6: 1. Threats, Attacks and Vulnerabilities (21%) 2 .Technology and Tools (22%) 3. Architecture and Design (15%) 4. Identity and Access Management (16%) 5. Risk Access Management (14%) 6. Cryptography and PKI (12%)
Which of the following describes a logic bomb?
- A program that performs a malicious activity at a specifictime or after triggering an event.
- A type of malicious code similar to a virus whose
primary purpose is to duplicate itself, and spread
while not necessarily internally damaging or destroying resources. - A program that appears to be a legitimate application,
utility, game or screen saver that performs malicious activities surreptitiously. - A program that has no useful purpose, but attempts
to spread itself to other systems and often damages resources on the system where it is found.
- A program that performs a malicious activity at a specifictime or after triggering an event.
Scenario: You are responsible for security at a small
organization and have been tasked with implementing a
security policy. Place the actions of organizing a security
policy in their appropriate order. Note that there are five
options, but you need to choose four.
Step 1: Obtain support and commitment from management
Step 2: Analyze risks to security Implement appropriate controls
Step 3: Implement appropriate controls
Step 4: Review, test, and update procedures
Of vulnerability, threat, or exploit, and risk, which would be assessed by the likelihood and impact?
- Vulnerability
- Risk
- Threat
- Exploit
- Risk
Name all 5 Threat Actors
- The Lone Hacker (Black Hat / Script kiddies)
- Organized Cyber Crimes
- Nation State
- Hacktivist
- Competitor
What’s the difference between a virus and a worm?
Viruses are programs that copies itself onto another computer system and need to be executed, whereas a worm does not need to attach itself to an executable file and instead can replicate over network resources.
What are the three ways viruses can damage the infected hosts?
- Slowing down the host by using up a computer’s resources, such as CPU and RAM.
- Denial of Service Attacks (DoS): Shutting down the host by using up all of its resources or destroying essential files.
- Ransomware “Scrambling” data on the host so that users can’t read it, and demanding money to “unscramble” it.
True or False:
All virus types need to infect a host, which can be distributed in a number of ways, such as on a disk, a network, or as an email or message attachment.
True
For example, email attachment viruses, which are usually a program or macro viruses hosted in an attached file, can use the infected victim’s list of email contacts to spoof the sender’s address when replicating.
True or False:
A virus can have a payload that executes when the virus is activated. The payload can perform any action available to the host process.
True
What is a Worm?
A worm is a self-replicating program. It is considered a memory-resident virus. A worm does not need to attach itself to an executable file and instead can replicate over network resources.
True or False:
A worm attaches itself to a host.
False
A virus attaches itself to a host.
True or False:
Once on a computer, a worm does not need human interaction.
True
True or False:
A virus automatically. replicates itself and can travel
across computer networks without human interaction.
False
A worm automatically. replicates itself and can travel
across computer networks without human interaction.