2.1.1 and 1.2.1 Flashcards

1
Q

Name the group of threat actors is characterized by novice computer professionals with little expertise or knowledge?

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three fundamental principles of information security, also known as the CIA Triad?

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacktivists are primarily driven by:

A

Political, commercial, or economic messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which group of threat actors is fueled by money and the desire to gain power to continue their influence?

A

Nation States and APT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do Insider Threats primarily exploit to cause damage within an organization?

A

Weak points known within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of hackers intend to cause damage and harm to their targets?

A

Black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shadow IT operates:

A

Within larger organizations but not following IT department rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of threat actor comes from inside of an organization and has trusted access to information?

A

Internal threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which motivation involves disrupting the normal operation of systems, networks, or services for various reasons?

A

Service disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary motivation for hacktivist groups?

A

Philosophical/political beliefs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which principle of the CIA Triad ensures that information remains accurate and complete, and hasn’t been tampered with or modified in any unauthorized way?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What principle of the CIA Triad ensures that authorized users have timely and reliable access to information and systems when needed?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of the CIA Triad in information security?

A

To provide a framework for developing and implementing security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the term for the application of scientific principles to provide assurance in explaining what has or has not happened on a computer system?

A

Digital forensics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of hashing or running backups/data through a one-way algorithm in digital forensics?

A

To provide a non-repudiation with the evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the AAA framework stand for in the context of network security?

A

Authentication, Authorization, and Accounting.

17
Q

Which method of authentication involves verifying the identity of a device, computer, or application to ensure it is authorized to access resources or communicate with other systems?

A

Credentials-based authentication.