all Flashcards

1
Q

The cybersecurity countermeasure technologies include cloud based technologies . Name the three types of cloud based services which could be implemented for technological safeguard

A

software as a serivce (SaaS)
infrastructure as a service (IaaS)
virtual security appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

describe one malware that requires users intervention

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the three principles of security

A

confidentiality , availability , integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

describe one malware that does not require user participation

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a malware silently carries out malicious operation while peter plays an online game . what malware is that?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

describe four types of spoofing attacks

A

mac spoofing
ip spoofing
arp spoofing
dns spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

which malware modifies the operating system to create a backdoor to allow attackers to use the backdoor to access the computer remotely

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the security protocol used in wifi to replace WEP is

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

explain one software that enables a criminal to obtain information about a user computer activities

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the three objectives for implementation within the cybersecurity policies and procedures

A

standards
guidelines
the procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are three states of data

A

data in transit
data at rest
data in process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

peter comes across a suspicious email from a popular retail store asking him to click a link to claim a prize . what is the possible malware that is accociated with this scenario

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

four triggers that could awaken a malicious program like logic bomb are

A

date
time
programs
delete user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the three security services for controlling access

A

authentication
authorization
accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what workforce framework categorizes cybersecurity work into seven categories.

A

operate and Maintain
protect and Defend
investigate
collect and operate
analyze
oversight and development
securely provision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the three classification of hackers?

A

white hat , black hat, grey hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

explain two characteristics of malware in computer systems

A

disrupt
gain access

18
Q

what tools criminals use to capture data streams over a network?

A

packet-sniffing

19
Q

name one computer hardware component that logic bomb can destroy.
logic bomb can destroy computer hardware component such as cooling fans , CPU,power supplies , hard drives and _______________

A

Memory

20
Q

state two type of access control

A

physical
logical

21
Q

a computer attack that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor is known as _____________

A

Zero-Day attack

22
Q

peter provided his bank account information to a stranger who pretended as a government official to confirm his identity . what is the deception technique that the stranger is using.

A

pretexting

23
Q

what is another term for piggybacking

A

tailgating

24
Q

when data goes beyond the limits of a buffer , it is known as _______

A

buffer overflow

25
Q

describe one malware that attacks a computer system or the data it contains , captive until the target makes a payment

A

ransomware

26
Q

provide one method of creating ciphertext

A

any1
transposition
substitution
one-time pad

27
Q

list two types of encryption algorithm and provide one encryption standard for each class

A

symmetric
AES
asymmetric
ECC

28
Q

list two types of encryption algorithm

A

symmetric
asymmetric

29
Q

list two protocols that uses asymmetric key algorithms

A

IKE
SSL
SSH
PGP

30
Q

describe virtual private network

A

private network
uses a public network/internet
create secure channel

31
Q

name three types of authentication methods

A

what you know
what you have
who you are

32
Q

define three authorization in access control

A

controls what a user can
cannot do
after successful authentication

33
Q

provide three types of security controls

A

deterrent
detective
corrective

34
Q

state three different between symmetric and asymmetric

A

s. more problematic
harder to manage
a. more secure

35
Q

peter met a lady in the bar who tired to gather information on his company participation in a new government project. describe the non technical deception technique used in this scenario

A

social engineering

36
Q

describe data masking

A

1.technology that secures data
2.replacing sensitive information with a non-sensitive looks like the original
3.non sensitive looks like the original

37
Q

provide two data masking techniques

A

substitution
shuffling

38
Q

what is steganography

A

conceals data/message
in another file

39
Q

describe three components involved in steganography

A

embedded data
cover text
stego-key

40
Q

what is data obfuscation

A

harder to understand
use and practice of data masking
and steganography