6.1 Summarize Confidentiality, integrity, and availability concerns Flashcards

1
Q

What action can help mitigate against the risk of Man-in-the-Middle (MitM) attacks?

A

Making senders and receivers authenticate themselves and use encryption to validate messages
A Man-in-the-Middle (MitM) attack occurs when a malicious actor sits between two communicating nodes and monitors, captures, and relays all communication between them, without them realizing. Making senders and receivers authenticate themselves and use encryption to validate messages can help mitigate against this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If someone claims to be receiving spim, what problem is occurring?

A

The person is receiving advertising or promotional schemes through instant messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an email-based threat that presents various advertising materials, promotional content, or money-making schemes to users?

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do cyber criminals typically use wiretapping to steal information?

A

Using a hardware device that inserts the hacker between two hosts. Cyber criminals have modern tools to perform wiretapping. For a relatively low cost, hardware devices allow a hacker to collect information traveling across a physical wire without being detected. This is commonly referred to as a network tap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What action can help mitigate the risk of replay attacks?

A

Ensuring that applications use encryption and time-stamping to make certain that the tokens cannot be misused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Replay Attack?

A

occurs when a malicious actor captures another host’s response to a server and replays that response in an effort to gain unauthorized access. This attack often involves exploiting an access token generated by an application. The application needs to use encryption and time-stamping to protect against this threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You no longer need the data on a hard copy. How can you ensure confidentiality when disposing of the data?

A

Put it through a shredder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

While working at your desk, you get a call from your bank. The representative tells you that he needs you to confirm your account number and password. What is the likely reason for this call?

A

This is most likely an illegitimate attempt to extract information from you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What technique would a hacker use to target the availability of network services?

A

Compromise hosts with bot malware to launch a coordinated attack that overwhelms a web service.
System availability means keeping a service running so that authorized users can access and process data. One attack that affects availability is called a Distributed Denial of Service (DDoS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As you are about to enter a secured building, a stranger waiting outside tells you he is a recent hire and asks you to let him in because he forgot his swipe card. What type of security attack is this?

A

Impersonation is a specific type of social engineering in which a person claims to be someone that he or she is not. In this case, someone who does not work at the company is trying to gain access to a secured facility by pretending to be a staff member.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can an administrator reduce the impact of hardware failures?

A

Provisioning redundant servers and configure a service to failover to a working server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In which type of email-based social engineering attack does a person pretend to be someone else for the purpose of identity concealment by manipulating an IP address, MAC address, or email header?

A

Spoofing is a type of social engineering attack in which someone pretends to be someone else for the purpose of identity concealment. Hackers will often spoof the IP address, the network adapter’s hardware MAC addresses, and email headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What action can help mitigate the risk of unexpected power outages?

A

Using a backup source, which provides a means to safely close down a server
Using a backup power source such as an Uninterruptible Power Supply (UPS) provides time to safely power down a system and prevents a “hard crash.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What security practice can a company use to protect its valuable data from catastrophic natural threats?

A

Creating backup data on servers in other facilities across the country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which action is an example of an appropriate redundancy measure?

A

Using a backup power generator in a hospital to provide electricity to critical life-support systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which is an availability-related factor to consider when choosing a third-party cloud service provider?

A

Fault tolerance

17
Q

What is an example illustrates a successful phishing attack?

A

A user replies to an email with his bank account number because the message indicated he was required to do so.

18
Q

What is the best tactic for defeating social engineering?

A

Training users to recognize and respond to social engineering situations

19
Q

What technique can be used to prevent eavesdropping on a data network?

A

Encrypting data in-transit

20
Q

You find you are unable to control your computer, and a message on the screen states that you must pay a fee before you can once again assume control of your computer. Which type of malware is infecting your computer?

A

Ransomware

21
Q

What best practice can prevent a malicious person from snooping on a victim’s computer when the victim walks away?

A

Locking the Windows computer by holding down the “Windows Logo Key” and pressing the “L” key

22
Q

If the IT administrator asks you to prevent snooping by sanitizing an old hard drive, what action should you take?

A

Thoroughly delete and overwrite any traces or bits of sensitive data on the hard drive.

23
Q

What action can help mitigate the risk of impersonation attacks?

A

Implementing strong identity controls, such as badging systems for building access and multi-factor authentication for network access

24
Q

What term describes the threat of someone stealing hard copies that have been thrown out?

A

Dumpster diving

25
Q

What is a social engineering attack?

A

An attack that depends on human factors and deception rather than technology