CNS Reviewer Flashcards

1
Q

Status Of Security In Computing (In Early 2000s)

A
  • Some computing professionals & managers do not even recognize the value of the resources they use or control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any piece of the __ can become the target of a computing crime.

A

computing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Status Of Security In Computing (In Early 2000s)

A
  • In the event of a computing crime, some companies do not investigate or prosecute.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a collection of hardware, software, data, and people that an organization uses to do computing tasks

A

computing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • The _ is the most serious vulnerability.
A

weakest point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Characteristics of Computer Intrusion

A computing system,,,

A
  • The principles of easiest penetration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Breaches

A

Exposure
Vulnerability
Threats
Control
Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a form of possible loss or harm

A

Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a weakness in the system

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Human attacks, natural disasters, errors

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a protective measure

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

h/w, s/w, data

A

*Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of Security Breaches

A
  • Disclosure
  • Deception
  • Disruption
  • Usurpation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

unauthorized access to info

A
  • Disclosure
  • ex: Snooping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

acceptance of false data

A
  • Deception:
  • ex: Modification, spoofing, repudiation of origin, denial of receipt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

prevention of correct operation

A
  • Disruption
  • ex: Modification, man-in-the-middle attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Security Components

A
  • Confidentiality
  • Integrity
    *Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

unauthorized control of some part of the system (___: take by force or without right)

A
  • Usurpation
  • ex: Modification, spoofing, delay, denial of service

usurp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The assets are accessible only by authorized parties.
- Keeping data and resources hidden

A
  • Confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The assets are modified only by authorized parties, and only in authorized ways.
* Data integrity (integrity)
* Origin integrity (authentication)

A
  • Integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Assets are accessible to authorized parties.
- Enabling access to data and resources

A

*Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Computing System Vulnerabilities

A
  • Hardware vulnerabilities
  • Software vulnerabilities
  • Data vulnerabilities
  • Human vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Software Vulnerabilities

A
  • Destroyed (deleted) software
  • Stolen (pirated) software
  • Altered (but still run) software
    • Logic bomb
    • Trojan horse
    • Virus
    • Trapdoor
    • Information leaks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • The principle of adequate protection
A

Data Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
* Storage of encryption keys
Data Security
26
* Software versus hardware methods
Data Security
27
Other Exposed Assets
*Storage media *Networks *Access *Key people
28
People Involved in Computer Crimes
*Amateurs *Crackers *Career Criminals
29
Methods of Defense
* Encryption * Software controls *Hardware controls * Policies * Physical controls
30
At the heart of all security methods
Encryption
31
Confidentiality of data
Encryption
32
Some protocols rely on __ to ensure availability of resources.
Encryption
33
__ does not solve all computer security problems.
Encryption
34
Software controls
* Internal program controls * OS controls * Development controls
35
are usually the 1st aspects of computer security that come to mind.
Software controls
36
This defines “___” for the site/system/etc.
Policy says what is, and is not, allowed security
37
enforce policies
Mechanisms
38
can be simple but effective Example: frequent changes of passwords
Mechanisms
39
If policies conflict, discrepancies may create security vulnerabilities
* Composition of policies
40
Gradually evolving and maturing
* Legal and ethical controls
41
Goals of Security
* Prevention *Detection *Recovery
42
Prevent attackers from violating security policy
* Prevention
43
Stop attack, assess and repair damage Continue to function correctly even if attack succeeds
*Recovery
44
Detect attackers’ violation of security policy
*Detection
45
Assurance
* Specification * Design * Implementation
46
How system will meet specification
Design
47
- Requirements analysis - Statement of desired functionality
Specification
48
Programs/systems that carry out design
Implementation
49
Operational Issues
* Cost-Benefit Analysis * Risk Analysis * Laws and Customs
50
Is it cheaper to prevent or to recover?
* Cost-Benefit Analysis
51
- Should we protect something? - How much should we protect this thing?
Risk Analysis
52
Are desired security measures illegal? Will people do them?
* Laws and Customs
53
Human Issues
* Organizational Problems * People problems
54
Human Issues 1. Organizational Problems
- Power and responsibility - Financial benefits
55
Human Issues 2. People Problems
- Outsiders and insiders - Social engineering
56
- “ the ownership of ideas and control over the tangible or virtual representation of those ideas. Use of another person’s ___ may or may not involve royalty payments or permission, but should always include proper credit.”
Intellectual Property
57
Intellectual Property includes:
́ Trade secrets ́ Copyrights ́ Trademarks ́ Patents
58
́ ___ constitute a threat
Intellectual Property _Breaches
59
́ Most common breach
́ Software piracy ́ 1/3 of all software in use is pirated
60
Deliberate Software Attacks
́ Malicious code ́ Malicious software ́ Malware ́ First business hacked out of existence: -́ Denial-of-service attack ́- Cloudnine: British Internet service provider
61
First business hacked out of existence:
-́ Denial-of-service attack ́- Cloudnine
62
Cloudnine
British Internet service provider
63
Segments of code
Virus
64
Attaches itself to existing program
Virus
65
Takes control of program access
Virus
66
Replication
Virus
67
Malicious program
Worms
68
Replicates constantly
Worms
69
Doesn’t require another program
Worms
70
Can be initiated with or without the user download
Worms
71
Categories of Threat
- Compromises to intellectual property - Software attacks - Deviations in quality of service - Espionage or trespass - Forces of nature - Acts of human error or failure - Information extortion - Deliberate acts of theft - Missing, inadequate, or incomplete - Missing, inadequate, or incomplete controls - Sabotage or vandalism - Theft - Technical hardware failures or errors - Technical software failures or errors - Technological obsolescence
72
Piracy, copyright infringement
Compromises to intellectual property
73
Viruses, worms, macros, DoS
Software attacks
74
ISP, power, WAN service issues from service providers
Deviations in quality of service
75
Unauthorized access and/or data collection
Espionage or trespass
76
Fire, flood, earthquake, lightning
Forces of nature
77
Accidents, employee mistakes
Acts of human error or failure
78
Blackmail or information disclosure
Information extortion
79
Illegal confiscation of equipment or information
Deliberate acts of theft
80
Loss of access to information systems due to disk drive failure, without proper backup and recovery plan
Missing, inadequate, or incomplete
81
Network compromised because no firewall security controls
Missing, inadequate, or incomplete controls
82
Destruction of systems or information
Sabotage or vandalism
83
Equipment failure
Technical hardware failures or errors
84
Illegal confiscation of equipment or information
Theft
85
Bugs, code problems, unknown loopholes
Technical software failures or errors
86
Antiquated or outdated technologies
Technological obsolescence
87
Other Malware
- Trojan Horse - Back door or trap door - Polymorphism - Hoaxes
88
Hide their true nature
Trojan Horse
89
Reveal the designed behavior ONLY WHEN ACTIVATED
Trojan Horse
90
Allows access to system at will with special privileges
Back door or trap door
91
Changes it apparent shape over time
Polymorphism
92
Makes it undetectable by techniques that look for preconfigured signatures
Polymorphism
93
Espionage or Trespass _ _
Intelligence Gathering Trespass
94
Protect with
Trespass Authentication Authorization
95
competitive intelligence
Legal
96
industrial espionage
Illegal
97
Thin line
98
shoulder surfing
one technique
99
Protect with
Trespass Authentication Authorization
100
Intelligence Gathering
Legal Illegal Thin line One technique
101
Hackers ́ 2 levels:
Experts & Novice
102
Develop software scripts
Experts
103
Develop program exploits
Experts
104
́ Novice
- Script kiddie - Packet monkeys
105
Use previously written software
Script kiddie
106
́Use automated exploits
Packet monkeys
107
System Rule Breakers
- Crackers - Phreakers
108
Individuals who _ or remove software protection designed to prevent unauthorized duplication
Crackers crack
109
Use public networks to make free phone calls
Phreakers
110
Pose some of most dangerous threats
Forces of Nature
111
Unexpected and occur with little or no warning
Forces of Nature
112
Forces of Nature
* Fire * Tornado * Tsunami * Electrostatic discharge * Dust contamination * Flood * Earthquake * Lightning * Landslide * Mudslide * Hurricane/typhoon
113
- ___ performed ___ intent or malicious purpose by and authorized user
Acts of Human Error or Failure Acts without
114
Greatest threat to org info security
- Organization’s own employees - Closest to the data - Mistakes
115
Mistakes
- Revelation of classified data - Entry of erroneous data - Accidental deletion or modification of data - Storage of data in unprotected areas - Failure to protect information
116
Attacker or trusted insider steals information
Deliberate Acts Information Extortion
117
Demands compensation
Information Extortion
118
Agree not to disclose information
Information Extortion
119
Deliberate sabotage of a computer system or business
Sabotage or Vandalism
120
Acts to destroy an asset
Sabotage or Vandalism
121
Damage to an image of an organization
Sabotage or Vandalism
122
Hackterist or cyber activist
Sabotage or Vandalism
123
* Interfere with or disrupt systems * Protest the operations, policies, or actions
Hackterist or cyber activist
124
Cyber terrorism Theft
Sabotage or Vandalism
125
- Illegal taking of another’s property
Theft
126
- Illegal taking of another’s property
́ Physical ́ Electronic ́ Intellectual ́ Constant
127
crime not always readily apparent
́ Problem
128
Large quantities of code written, published, and sold with bugs
Technical Software Failures or Errors
129
Bugs undetected and unresolved
Technical Software Failures or Errors
130
Combinations of software can cause issues
Technical Software Failures or Errors
131
Weekly patches
Technical Software Failures or Errors
132
Outdated hardware or software
Technology Obsolescence
133
Reliability problems
Technology Obsolescence
134
Management problem - Should have plan in place
Technology Obsolescence
135
Non-support of legacy systems
Technology Obsolescence
136
Can be costly to resolve
Technology Obsolescence
137
Attacks
- IP scan and attack - Web browsing - Virus - Mass mail - Simple Network Management Protocol (SNMP)
138
Infected system scans IP addresses and targets vulnerabilities
IP scan and attack
139
Infects web content files infectious
Web browsing
140
Infect other machines
Virus
141
Infects any device that is unprotected
Unprotected shares
142
Use common password employed in early versions of the protocol the attacking program can gain control of device
Simple Network Management Protocol (SNMP)
143
e-mailing to all addresses in an address book
Mass mail
144
Methods of Attack
1. Social Engineering 2. IP-Spoofing 3. SYN spoofing 4. Scanning 5. Denial of service 6. Spam 7. Mail bombing 8. Sniffing 9. Man-in-the-Middle
145
Methods of Attack
́ - Password Crack - Brute force - Dictionary
146
The design of the network infrastructure and communication protocols are a major contributor
Methods of Attack
147
IP address of the source element of the data packets are altered and replaced with bogus addresses
IP-Spoofing
148
́ The server is overwhelmed by spoofed packets
SYN spoofing
149
Way of determining which ports are open and can be used
Scanning
150
Smurf send large amount of spoofed ping packets
Denial of service
151
Overwhelms the system
Denial of service
152
Can stop response
Denial of service
153
Monitors data traveling over a network
Sniffing
154
legitimated and non legitimate
Sniffing
155
Packet sniffing
Sniffing
156
Monitors or sniffs packets from network
Man-in-the-Middle
157
Modifies the packets
Man-in-the-Middle
158
Inserts them back into the network
Man-in-the-Middle
159
Allows attacker to eavesdrop, change, delete, reroute, add, or divert data
Man-in-the-Middle
160
́ Variant ___ involves the interception of an encryption key exchange
Man-in-the-Middle Spoofing
161
- There is an imbalance between our abilities as developers and the abilities and resources of the attacker.
Programming Errors
162
- Software can be correct without being secure.
Programming Errors
163
- ___ of software security bugs come from ___,well-understood’ programming mistakes
Programming Errors 95 percent 19 'common
164
- Explores the contents of a web browser’s cache
Timing Attack
165
- Allows a Web designer to create a malicious form of cookie that is stored on the client’s system
Timing Attack
166
- __ allow designer to collect information on how to access password protected sites
Timing Attack Cookie
167
Cyberattacks only target large organizations and governments; individuals are safe from such threats
Fiction
168
Using strong, complex passwords for all accounts is enough to ensure complete cybersecurity.
Fiction
169
Regularly cleaning browser history and cookies ensures complete online privacy and protection
Fiction
170
Online shopping is safer when using public Wi-Fi networks because they are encrypted
Fiction
171
Strong passwords are characterized by their complexity, including a mix of uppercase and lowercase letters, numbers, and special characters.
Fact
172
___ is a technique that manipulates individuals into revealing confidential information or performing actions that compromise security.
Social engineering
173
Regularly updating your software and operating systems is an effective way to protect against known vulnerabilities and security threats
Fact
174
Malware is always spread through email attachments; downloading files from websites is always safe.
Fiction
175
Cybersecurity measures only involve technology; human behavior doesn’t play a significant role.
Fiction
176
__ transforms data into a coded format that can only be deciphered with the appropriate decryption key.
Data encryption
177
Regularly backing up data to an external source or cloud storage is essential to ensure data recovery in the event of hardware failure or a cyberattack.
Fact
178
A ___ can provide a secure and private connection by encrypting internet traffic and masking the user’s IP address.
VPN(Virtual Private Network)
179
A ___ is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
firewall
180
Two-factor authentication (2FA) involves using two different passwords to access an account
Fiction
181
Once a file is deleted from a computer, it is permanently gone and cannot be recovered.
Fiction
182
Antivirus software is enough to protect a computer from all types of malware and cyber threats
Fiction
183
Multi-factor authentication (MFA) requires users to provide two or more different authentication factors to access an account.
Fact
184
Once you delete a post or photo from a social media platform, it’s permanently removed from the internet.
Fiction
185
Phishing emails are always easy to spot due to poor grammar and spelling mistakes.
Fiction
186
Using “incognito” or “private browsing” mode in a web browser guarantees complete anonymity and privacy while browsing the internet.
Fiction
187
is the practice of protecting systems, networks, and programs from digital attacks
Cybersecurity
188
* A ___ has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe.
successful cybersecurity
189
These ___ are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
cyberattacks
190
In an __, the people, processes, and technology must all complement one another to create an effective defense from cyber-attacks.
organization
191
A __ can automate integrations across select Cisco Security products and accelerate key security operations
unified threat management system
192
key security operations functions:
detection, investigation, and remediation
193
is not only about securing information from unauthorized access
Information security
194
Information Security programs are built around 3 objectives, commonly known as __
CIA – Confidentiality, Integrity, Availability.
195
is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information
Information security
196
A primary way to avoid this is to use __ to safeguard your data so that even if the attacker gains access to your data, he/she will not be able to decrypt it.
encryption techniques
197
means that only the authorized individuals/systems can view sensitive or classified information
Confidentiality
198
Encryption standards include:
AES(Advanced Encryption Standard) DES (Data Encryption Standard)
199
Another way to protect your data is through a __.
VPN tunnel
200
_ and helps the data to move securely over the network
VPN stands for Virtual Private Network
201
making sure that data has not been modified
Integrity
202
__ is a failure to maintain data integrity.
Corruption of data
203
To check if our data has been modified or not, we make use of a __.
hash function
204
This means that the data should be readily available to its users.
Availability
205
__ may render a network unavailable as the resources of the network gets exhausted.
Attacks such as DoS or DDoS
206
To ensure __, the network/system administrator should maintain hardware, make regular upgrades, have a plan for fail-over and prevent bottleneck in a network.
availability
207
The Parkerian Hexad Added The Following Three Additional Elements:
- Authenticity - Possession - Utility
208
refers to the veracity of the claim of origin or authorship of the information.
Authenticity
209
For example, one method for verifying the authorship of a hand written document is to compare the handwriting characteristics of the document to a sampling of others which have already been verified. For electronic information, a digital signature could be used to verify the authorship of a digital document using __ (could also be used to verify the integrity of the document)
public-key cryptography
210
means usefulness
Utility
211
__ invented the PC in the late ’70s but needed an__
IBM operating system
212
* _ had never written an OS but accepted the challenge
Microsoft
213
_ had an OS but turned them down
Digital Research
214
IBM went to a small company (__) that had created __
Bill Gates at Microsoft BASIC
215
Microsoft released it as __
MS-DOS V 1.1 (Microsoft Disk Operating System)
216
Gates found an OS called _ and purchased it from the person who wrote it
Quick-and-Dirty-Operating-System (QDOS)
217
___ ultimately released in 1994
MS-DOS 6.22
218
MS-DOS 6.22__
1994
219
_ used a command-line interface
DOS
220
How does a command-line interface work? * Begins with a __ indicating the computer is ready to do something * Type in a command and press ENTER * The command is executed * A new prompt is displayed—ready for the next command
prompt
221
* CLI executes commands like the __
Windows GUI
222
In __, type the command and press ENTER
CLI
223
In __, point and click to execute commands
GUI
224
Accessing the Command Line * In Windows 2000 use the __ * Start | Run * Type _ * You may also access the command line through the Start | All
Run dialog box cmd
225
* The _ is always focused on a specific folder
command prompt
226
* _ operate on the files and folders in the folder in which you are focused
Any commands
227
* You must first focus on the __ where you want to work
drive and folder
228
Filenames and File Formats * Each _ is stored as a file on the drive
program or piece of data
229
* Filenames have two parts:
1. Filename 2. Extension
230
* In _, up to 8 characters long
Filename
231
* In _, up to 3 characters long * Optional
Extension
232
* The filename and extension are separated by a ______ - Called the _____
dot 8.3 naming system
233
* These characters may not be used
/ \ [ ] | ÷ + = ; , * ? (special characters)
234
* Windows does not restrict the __ to __ (can be up ___ characters)
filename 8.3 255
235
* To be __ with DOS you need to follow the 8.3 standard
backward-compatible
236
* Windows creates two filenames for every file to ensure __
backward- compatibility
237
* The ___ tells the computer the type of file
extension * .exe, .doc, .xls
238
File Formats * All files written in __
binary format
239
File Formats * __used for text 1. 2.
American Standard Code for Information Interchange (ASCII) 1. Universal file format 2. Defines 256 8-bit characters
240
Uses 16-bit code to cover every character for the most common languages
Unicode
241
Drives and Folders * At __, Windows assigns partitions and a drive letter * * *
boot * Floppy drives * Hard drive * CD-ROM drives
242
are usually assigned A: or B:
Floppy drives
243
partitions may be assigned C: to Z:
Hard drive
244
are named after hard drives
CD-ROM drives
245
Windows uses a __
hierarchical directory tree
246
* Files are put into groups called ___
folders
247
* In DOS we call folders _
directories
248
The _ is at the beginning of the hierarchical structure with folders underneath
root directory
249
* Folders and files must be _ - Can’t be the same name in the same folder
unique
250
represents the root directory of C
C:\
251
* To describe a subfolder, add the ___
* C:\TEST name of the folder
252
The location of a file is called the __
path * The path of C:\test\file.txt is C:\test
253
* The __ requires the exact syntax for each command
command line
254
* Type the name of the command and desired or allowed __
switches
255
* _ modify the behavior of the command
Switches
256
* Multiple switches may be _
allowable
257
Displays the directory in wide mode and one page at a time
* DIR /W /P
258
* Help with any command is readily available in __
one of three ways
259
one of three ways
HELP HELP command Command/?
260
gives a one-line description of each command
HELP
261
gives specific help for the command
HELP command
262
gives specific help for the command
Command/?
263
The _ lists the contents of a particular directory
DIR command
264
* The __ command lists only the filenames
DIR/W
265
The __ command is used to change the focus to a different directory
CD (or CHDIR)
266
* The _ command is used to return to the root directory
CD\
267
Goes up one directory
CD..
268
* To switch between drives, type the drive letter followed by a colon
* C: * D:
269
* The __ command is used for creating a directory
MD (or MKDIR)
270
The __ command is used for deleting files
DEL
271
__ command is used for deleting directories and subdirectories
RD (RMDIR)
272
* The __ command is used for deleting directories containing files and subdirectories
DELTREE
273
To run a program: * __ focus to the directory where the program is stored * Type the filename with or without its _ and press ENTER
Change the DOS CD C:\Program Files\My Program extension Setup.exe
274
Working with Files _ (_ , _, _, _) are special values assigned to a file
Attributes (H, R, S, A)
275
hides the file
Hidden
276
protects a file from being deleted or modified
Read-only
277
identifies system files
System
278
identifies files that have not been backed up
Archive
279
The _ program is used to inspect and change file attributes
ATTRIB.EXE
280
can be used to change the attributes
Attrib
281
* Use _ to add attribute
+
282
* Use _ to remove attribute
283
_ AILOG.TXT Makes it read only
Attrib +R
284
__ AILOG.TXT Makes it no longer hidden
Attrib –H
285
are special characters that enable commands to act on more than one file at a time
Wildcards
286
The _ represents any number of characters
*
287
The _ represents a single character
?
288
_ command is used to rename files
REN
289
* _ commands are used to delete files
DEL and ERASE
290
* _ command is used for making a copy of the file in a new location
COPY
291
* _ command is used for moving the file to a new location
MOVE
292
* _ command is used for working with multiple directories
XCOPY
293
Five-Step COPY/MOVE Process 1. Point the command prompt to the directory containing the files to be copied or moved _____ 2. Type COPY or MOVE and a space _________ 3. Type the name(s) of the file(s) to be copied/moved and a space ____ 4. Type the path of the new location for the files ______ 5. Press ENTER
C:\> CD \DOCS C:\DOCS> COPY C:\DOCS> COPY *.doc C:\DOCS> COPY *.doc c:\Steam
294
1. What is the most serious vulnerability in a computing system? A) The most complex point B) The weakest point C) The newest technology D) The most secure feature
B
295
2. Which term describes unauthorized access to information in a security breach? A) Disruption B) Usurpation C) Deception D) Disclosure
D
296
3. Which security component ensures that assets are accessible only by authorized parties? A) Integrity B) Availability C) Confidentiality D) Authentication
C
297
4. Which type of control is usually the first aspect of computer security that comes to mind? A) Hardware controls B) Software controls C) Physical controls D) Encryption
B
298
5. Which method is at the heart of all security methods and ensures confidentiality of data? A) Encryption B) Software controls C) Physical controls D) Policies
A
299
6. Which term refers to the unauthorized control of some part of the system during a security breach? A) Usurpation B) Disruption C) Disclosure D) Deception
A
300
7. Which of the following is NOT a software vulnerability? A) Logic bomb B) Virus C) Encryption D) Trapdoor
C
301
8. What is the purpose of risk analysis in operational security issues? A) To assess financial benefits B) To prevent legal issues C) To determine the level of protection required D) To enhance social engineering techniques
C
302
9. Which type of security breach involves the modification of data? A) Disruption B) Deception C) Usurpation D) Disclosure
A
303
10. What is malware? A) Software designed for a good purpose B) Software designed for a nefarious purpose C) Hardware that is vulnerable to attacks D) A virus that spreads through emails
B
304
11. Which of the following is NOT a type of malicious software? A) Virus B) Trojan horse C) Worm D) Patch
D
305
12. What is a worm? A) A piece of code that attaches itself to another program B) A piece of code that attempts to penetrate networks and systems C) Software that spies on users D) Software supported by advertising
B
306
13. Which type of malware changes its code to avoid detection? A) Virus B) Worm C) Polymorphic malware D) Logic bomb
C
307
14. What is a Trojan horse? A) A program that replicates itself B) A program that appears to do one thing but hides malicious activities C) A piece of code that sits dormant until triggered D) Software that spies on users
B
308
15. What is a rootkit designed to do? A) Modify the operation of the operating system B) Replicate itself by attaching to another file C) Spy on users D) Encrypt files for ransom
A
309
18. What are backdoors originally used for? A) Encrypting files for ransom B) Replicating viruses C) Gaining access to an application if normal access is blocked D) Modifying the operating system
C
310
16. What triggers a logic bomb? A) When a user logs into a specific website B) When specific conditions are met C) When a document is attached to an email D) When a system is patched
B
311
17. What are botnets? A) Networks of machines used to conduct attacks and spread malware B) Standalone programs that need to be installed by users C) Software that spies on users D) Programs that encrypt files for ransom
A
312
19. What is a denial-of-service (DoS) attack? A) An attack designed to steal user data B) An attack designed to prevent a system or service from functioning normally C) An attack that modifies the operating system D) An attack that encrypts files for ransom
b
313
20. What is social engineering? A) A type of malware that replicates itself B) A method of manipulating people into divulging confidential information C) A technique used to encrypt files for ransom D) A way to spy on user activities
b
314
21. What does a network sniffer do? A) Encrypts files for ransom B) Monitors and analyzes network traffic C) Replicates itself by attaching to other files D) Modifies the operating system
b
315
22. What is session hijacking? A) Monitoring network traffic B) Taking control of a user session by stealing session cookies C) Encrypting files for ransom D) Modifying the operating system
B
316
24. What is a botnet? A) A single machine used for attacking a network B) A network of compromised machines used to perform coordinated attacks C) A type of virus that attaches to executable files D) A type of software that spies on users
A
317
23. What is a common defense against man-in-the-middle attacks? A) Encrypting all sensitive communications B) Never updating software C) Disabling all network connections D) Running an antivirus program
A
318
25. What is the primary goal of cybersecurity? A) To increase system speed B) To protect systems, networks, and programs from digital attacks C) To improve software performance D) To manage hardware resources
B
319
26. What are the three objectives of the CIA Triad in information security? A) Confidentiality, Integrity, Availability B) Confidentiality, Identity, Authentication C) Integrity, Availability, Utility D) Integrity, Confidentiality, Usability
A
320
27. What does confidentiality in the CIA Triad refer to? A) The ability to access data quickly B) Ensuring that data is only accessible to authorized individuals C) The accuracy of data D) The usability of the data
B
321
28. What is meant by data integrity? A) Ensuring data is available when needed B) Ensuring data has not been modified C) Ensuring data is confidential D) Ensuring data can be easily accessed
b
322
29. Which tool is commonly used to check if data has been modified? A) Firewall B) Hash function C) Antivirus D) VPN
B
323
30. What does availability in the CIA Triad ensure? A) Data is kept confidential B) Data is accurate C) Data and systems are available to authorized users when needed D) Data is encrypted
C
324
31. What additional element in the Parkerian Hexad refers to verifying the origin of information? A) Possession B) Authenticity C) Utility D) Confidentiality
B
325
32. In the context of the Parkerian Hexad, what does possession or control mean? A) Data can be accessed by authorized users B) Data can be modified by authorized users C) Ownership or control of the data is at risk, even if the data is not accessed D) Data is kept confidential and unmodified
C
326
33. What does utility refer to in the Parkerian Hexad? A) The usefulness of data B) The ability to encrypt data C) The availability of data D) The security of data
A
327
34. What is the purpose of the DIR command in the CLI? A) Change directory B) Delete files C) List the contents of a directory D) Rename files
C
328
35. Which command is used to change the focus to a different directory? A) CD B) DIR C) DEL D) COPY
A
329
36. Which symbol in the CLI represents any number of characters? A) ? B) *** C) # D) &
B
330
37. How do you return to the root directory in DOS? A) CD B) CD .. C) DIR D) DEL
B
331
Question: (38-40) You need to create a new folder named Reports on your computer's D: drive, move into that folder, and then create a text file named summary.txt with some initial content. After that, you want to move summary.txt to another folder called Archived. 38. How would you create the Reports directory on the D: drive and navigate into it? A) REM Reports followed by CD D:\Reports B) MD D:\Reports followed by CD D:\Reports C) MOVE Reports followed by CD D:\Reports D) COPY CON Reports followed by CD D:\Reports
B
332
39. How would you create a file named summary.txt and start editing it using the command line? A) MOVE summary.txt B) COPY CON summary.txt C) CD summary.txt D) REM summary.txt
B
333