Chapter 1 Flashcards

1
Q

A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security risks is most pressing?

Availability
Integrity
Confidentiality
Non-repudiation

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following BEST describes a cyber terrorist?

Desires some kind of financial reward or revenge

Exploits internal vulnerabilities to steal information

Disrupts network-dependent institutions

Downloads and runs attacks available on the internet

A

Disrupts network-dependent institutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your computer system is a participant in an asymmetric cryptography system. You’ve created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user.

In this example, which protection does the hashing activity provide?

Availability
Integrity
Confidentiality
Non-repudiation

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an example of an internal threat?

A delivery man is able to walk into a controlled area and steal a laptop.

A server backdoor allows an attacker on the internet to gain access to the intranet site.

A user accidentally deletes the new product designs.

A water pipe in the server room breaks.

A

A user accidentally deletes the new product designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following could an employee also be known as?

Internal threat

Cybercriminal

Script kiddie

Exploit

A

Internal threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

By definition, which security concept uses the ability to prove that a sender undeniably sent an encrypted message?

Authentication
Integrity
Non-repudiation
Privacy

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following includes all hardware and software necessary to secure data, such as firewalls and antivirus software?

Users and administrators
Policies
Assets
Physical security

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are often identified as the three main goals of security? (Select three.)

Integrity
Non-repudiation
Policies
Employees
Assets
Availability
Confidentiality

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the correct definition of a threat?

Instance of exposure to losses from an attacker

Absence or weakness of a safeguard that could be exploited

The likelihood of an attack taking advantage of a vulnerability

Any potential danger to the confidentiality, integrity, or availability of information or systems

A

Any potential danger to the confidentiality, integrity, or availability of information or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an example of a vulnerability?

Misconfigured server
Virus infection
Unauthorized access to confidential resources
Denial-of-service attack

A

Misconfigured Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Application layer of the security model includes which of the following? (Select two.)

User education
Web application security
User management
Log management
Environmental controls

A

Web application security
User management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When training your employees on how to identify various attacks, which of the following policies should you be sure to have and enforce? (Select two.)

Clean desk policies
Password policies
Group policies
Usage policies
Encryption policies

A

Clean desk policies
Password policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following reduces the risk of a threat agent being able to exploit a vulnerability?

Countermeasures
Manageable network plans
Secure data transmissions
Implementation of VLANs

A

Countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following items would be implemented at the Data layer of the security model?

Cryptography
Auditing
Authentication
Group policies

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following items would you secure in the Perimeter layer of the security model?

Firewalls
VLANs
Switches
Routers

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is the single greatest threat to network security?

Email phishing
Employees
Unsecure physical access to network resources
Weak passwords

A

Employees

17
Q

Which of the following is a security approach that combines multiple security controls and defenses?

Network security
Cumulative security
Countermeasure security
Layered security
Perimeter security

A

Layered security

18
Q

Which of the following items would be implemented at the Network layer of the security model?

Firewalls using ACLs
Wireless networks
Network plans
Penetration testing

A

Penetration testing

19
Q

Which of the following is one of the MOST common attacks on employees?

Password attack
DNS attack
Phishing attack
Remote attack

A

Phishing attack

20
Q

The Policies, Procedures, and Awareness layer of the security model includes which of the following? (Select two.)

User education
Motion detectors
Environmental controls
Employee onboarding
Server cages

A

User education
Employee onboarding