16-A Flashcards

1
Q

What is information security?

A

The practice of controlling access to data in any format, including computer data and paper records

Information security aims to ensure confidentiality, integrity, and availability (CIA triad) of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define the CIA triad in information security.

A

Confidentiality, Integrity, Availability

These are the three core properties that secure information should maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does confidentiality mean in the context of information security?

A

Certain information should only be known to certain people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the meaning of integrity in information security?

A

Data is stored and transferred as intended, and any modification is authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain availability in information security.

A

Information is accessible to those authorized to view or modify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does cybersecurity differ from information security?

A

Cybersecurity specifically refers to controls that protect against attacks on computer storage and processing systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a vulnerability?

A

A weakness that could be accidentally triggered or intentionally exploited to cause a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define a threat in the context of security.

A

The potential for someone or something to exploit a vulnerability and breach security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is risk in information security?

A

The likelihood and impact of a threat actor exercising a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a configuration baseline?

A

A set of recommendations for deploying a computer in a hardened configuration to minimize vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the term ‘non-compliant system’ refer to?

A

A system that has drifted from its hardened configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an unprotected system?

A

A system missing or improperly configuring at least one technical security control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define a software vulnerability.

A

A fault in design or code that can cause an application security system to be circumvented or cause the application to crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a zero-day vulnerability?

A

A vulnerability that is exploited before the developer knows about it or can release a patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are unpatched systems?

A

Systems that have not been updated with OS and application patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does BYOD stand for?

A

Bring Your Own Device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is social engineering?

A

Techniques that persuade or intimidate people into revealing confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain the concept of impersonation in social engineering.

A

Developing a pretext scenario to interact with an employee and gain their trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is dumpster diving?

A

Combing through an organization’s garbage to find useful documents for an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is shoulder surfing?

A

Learning a password or PIN by watching the user type it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define tailgating in the context of security.

A

Entering a secure area without authorization by following someone who has access.

22
Q

What is phishing?

A

Using social engineering techniques to make spoofed electronic communications seem authentic.

23
Q

What distinguishes spear phishing from regular phishing?

A

Spear phishing targets specific individuals with personalized information to increase effectiveness.

24
Q

What is whaling in cybersecurity?

A

An attack directed specifically against upper levels of management.

25
Q

Define vishing.

A

Phishing conducted through voice channels like telephone or VoIP.

26
Q

What is an evil twin attack?

A

Using a rogue wireless access point to harvest credentials from users.

27
Q

What is footprinting?

A

An information-gathering threat where the attacker learns about the configuration of the network and security systems.

28
Q

What is a spoofing threat?

A

An attack where the threat actor masquerades as a trusted user or computer.

29
Q

Define an on-path attack.

A

A specific type of spoofing where the threat actor intercepts traffic between two hosts.

30
Q

What is a denial of service (DoS) attack?

A

An attack that causes a service to fail or become unavailable to legitimate users.

31
Q

What is a distributed denial of service (DDoS) attack?

A

A DoS attack launched from multiple compromised systems, known as a botnet.

32
Q

What does DDoS stand for?

A

Distributed Denial of Service

DDoS attacks are launched from multiple compromised systems referred to as a botnet.

33
Q

What is a botnet?

A

A network of compromised systems used to launch coordinated attacks

Botnets are established by compromising machines and installing bots on them.

34
Q

What is the primary function of command & control (C&C) hosts in a DDoS attack?

A

To coordinate attacks using compromised devices

C&C hosts manage the botnet and direct the attack.

35
Q

How can plaintext passwords be captured?

A

By obtaining a password file or sniffing unencrypted traffic

Unencrypted protocols make it easy for threat actors to intercept credentials.

36
Q

What is a cryptographic hash?

A

A fixed-length string produced from a variable-length input using a one-way function

Hashing is used for secure storage of data where recovery of the original input is not needed.

37
Q

What are two common techniques used by password cracking software?

A
  • Dictionary attack
  • Brute force attack

Dictionary attacks use common words, while brute force tries all combinations.

38
Q

What is Cross-site Scripting (XSS)?

A

An attack that exploits input validation vulnerabilities in web applications

XSS allows attackers to inject malicious scripts that run in the client’s browser.

39
Q

What distinguishes a nonpersistent XSS attack from a persistent XSS attack?

A

Nonpersistent XSS does not change server data, while persistent XSS does

Persistent XSS inserts code into a back-end database that affects other users.

40
Q

What is SQL Injection?

A

An attack that modifies SQL queries to execute unauthorized commands

SQL injection can extract, insert, or alter data in a database.

41
Q

What are the three principal types of cryptographic technology?

A
  • Symmetric encryption
  • Asymmetric encryption
  • Cryptographic hashing

Each type serves different roles in securing data.

42
Q

What is symmetric encryption?

A

A method that uses a single secret key for both encryption and decryption

Security risks arise if the key is lost or stolen.

43
Q

What is asymmetric encryption?

A

A method that uses a key pair (private and public keys) for encryption and decryption

Only the linked key can reverse the operation performed by the other key.

44
Q

What is the main drawback of asymmetric encryption?

A

A message cannot be larger than the key size

This limitation necessitates the use of symmetric encryption for larger messages.

45
Q

What is a digital signature?

A

A cryptographic method that verifies the integrity and authenticity of a message

It involves hashing the message and encrypting the hash with a private key.

46
Q

What is the purpose of key exchange?

A

To allow two hosts to share a symmetric encryption key securely

Key exchange uses asymmetric encryption to protect the exchange of the secret key.

47
Q

Fill in the blank: A threat actor can capture a password hash transmitted during user authentication using an _______.

A

on-path attack

On-path attacks can intercept data as it travels across the network.

48
Q

True or False: The level of risk from zero-day attacks is only significant with respect to EOL systems.

A

False

Zero-day vulnerabilities can affect any system, not just those that are end-of-life.

49
Q

What type of attack involves sending a crafted email to steal credentials?

A

Phishing attack

This attack often uses social engineering to entice users to click on malicious links.

50
Q

What is the difference between tailgating and shoulder surfing?

A

Tailgating is unauthorized entry following an authorized user, while shoulder surfing is observing someone entering sensitive information

Both are physical security threats but target different aspects of security.

51
Q

What type of password cracking attack is a five-character password vulnerable to?

A

Brute force attack

Short and non-complex passwords can be cracked quickly using brute force techniques.

52
Q

What type of cryptographic key is delivered in a digital certificate?

A

Public key

Digital certificates bind a public key to an entity, enabling secure communication.