Additional Knowledge Flashcards

1
Q

Define ‘credential-stuffing’

A

Attackers employ usernames and passwords leaked from other breaches and try them on different websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A business continuity plan indicates that a system can only be down for a maximum of eight hours. Data within the past seven days must remain accessible once the system returns to service. What does the data availability time frame represent?

A

The recovery time objective (RTO) identifies the maximum time it takes to recover a system during an outage. Eight hours represent the RTO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network administrator configures the security for data transmitted by employees working remotely. The data includes personal employee information such as addresses and phone numbers. Which category does this scenario BEST fit?

A

Private data; Includes personal employee information such as addresses or phone numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A healthcare organization is setting up a system to store patient data securely. To ensure that only authorized personnel can access the data and it cannot compromise the system during a breach, which technique should the organization implement?

A

In the context of the healthcare organization, hashing would ensure the security of patient data, even if unauthorized personnel somehow gained access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A tech subject matter expert (SME) is evaluating automation-related costs. What is a challenge associated with requirements for ongoing support?

A

Automation and orchestration require ongoing support to stay effective and secure. Automation and orchestration will quickly erode without support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which feature of web filtering is the MOST effective for organizations aiming to reduce the risk of malware infections by blocking access to websites known for hosting malicious content?

A

URL scanning examines the URLs requested by users and can block access to specific URLs known malicious sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A financial organization has hired a cybersecurity expert to strengthen the security of its system. The expert recommends implementing a specific technique into unreadable ciphertext by converting plaintext credit card information, regardless if it is active, in transit, or at rest. What technique should the cybersecurity expert implement?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The head of IT security at a financial institution is working to enhance the directive controls in place within the company. Which of the following should the institution implement?

A

Building access procedures serve as an example of directive controls. They provide guidance and direction on the steps for gaining access to the building, helping to achieve the desired security outcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A high-tech corporation has been experiencing numerous security breaches. It has concerns about the constant attacks attempting to steal sensitive data. Which strategies would be the MOST appropriate for the corporation to handle these threats effectively?

A

An offensive approach, or “active defense,” involves actively searching for threats to prevent an attack before it happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following involves threat actors attaching unauthorized devices to a physical network port, allowing them to eavesdrop on network traffic, intercept and modify data, run spoofed services and applications, or execute exploit code against other hosts?

A

Commonly called on-path attacks, lack of integrity compromises the reliability of the data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly