CNS Reviewer Flashcards

1
Q

Status Of Security In Computing (In Early 2000s)

A
  • Some computing professionals & managers do not even recognize the value of the resources they use or control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any piece of the __ can become the target of a computing crime.

A

computing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Status Of Security In Computing (In Early 2000s)

A
  • In the event of a computing crime, some companies do not investigate or prosecute.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a collection of hardware, software, data, and people that an organization uses to do computing tasks

A

computing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • The _ is the most serious vulnerability.
A

weakest point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Characteristics of Computer Intrusion

A computing system,,,

A
  • The principles of easiest penetration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Breaches

A

Exposure
Vulnerability
Threats
Control
Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a form of possible loss or harm

A

Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a weakness in the system

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Human attacks, natural disasters, errors

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a protective measure

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

h/w, s/w, data

A

*Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of Security Breaches

A
  • Disclosure
  • Deception
  • Disruption
  • Usurpation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

unauthorized access to info

A
  • Disclosure
  • ex: Snooping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

acceptance of false data

A
  • Deception:
  • ex: Modification, spoofing, repudiation of origin, denial of receipt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

prevention of correct operation

A
  • Disruption
  • ex: Modification, man-in-the-middle attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Security Components

A
  • Confidentiality
  • Integrity
    *Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

unauthorized control of some part of the system (___: take by force or without right)

A
  • Usurpation
  • ex: Modification, spoofing, delay, denial of service

usurp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The assets are accessible only by authorized parties.
- Keeping data and resources hidden

A
  • Confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The assets are modified only by authorized parties, and only in authorized ways.
* Data integrity (integrity)
* Origin integrity (authentication)

A
  • Integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Assets are accessible to authorized parties.
- Enabling access to data and resources

A

*Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Computing System Vulnerabilities

A
  • Hardware vulnerabilities
  • Software vulnerabilities
  • Data vulnerabilities
  • Human vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Software Vulnerabilities

A
  • Destroyed (deleted) software
  • Stolen (pirated) software
  • Altered (but still run) software
    • Logic bomb
    • Trojan horse
    • Virus
    • Trapdoor
    • Information leaks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • The principle of adequate protection
A

Data Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  • Storage of encryption keys
A

Data Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  • Software versus hardware methods
A

Data Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Other Exposed Assets

A

*Storage media
*Networks
*Access
*Key people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

People Involved in Computer Crimes

A

*Amateurs
*Crackers
*Career Criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Methods of Defense

A
  • Encryption
  • Software controls
    *Hardware controls
  • Policies
  • Physical controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

At the heart of all security methods

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Confidentiality of data

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Some protocols rely on __ to ensure availability of resources.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

__ does not solve all computer security problems.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Software controls

A
  • Internal program controls
  • OS controls
  • Development controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

are usually the 1st aspects of computer security that come to mind.

A

Software controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

This defines “___” for the site/system/etc.

A

Policy says what is, and is not, allowed

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

enforce policies

A

Mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

can be simple but effective
Example: frequent changes of passwords

A

Mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

If policies conflict, discrepancies may create security vulnerabilities

A
  • Composition of policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Gradually evolving and maturing

A
  • Legal and ethical controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Goals of Security

A
  • Prevention *Detection *Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Prevent attackers from violating security policy

A
  • Prevention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Stop attack, assess and repair damage
Continue to function correctly even if attack succeeds

A

*Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Detect attackers’ violation of security policy

A

*Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Assurance

A
  • Specification
  • Design
  • Implementation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How system will meet specification

A

Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
  • Requirements analysis
  • Statement of desired functionality
A

Specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Programs/systems that carry out design

A

Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Operational Issues

A
  • Cost-Benefit Analysis
  • Risk Analysis
  • Laws and Customs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Is it cheaper to prevent or to recover?

A
  • Cost-Benefit Analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
  • Should we protect something?
  • How much should we protect this thing?
A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Are desired security measures illegal?
Will people do them?

A
  • Laws and Customs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Human Issues

A
  • Organizational Problems
  • People problems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Human Issues
1. Organizational Problems

A
  • Power and responsibility
  • Financial benefits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Human Issues
2. People Problems

A
  • Outsiders and insiders
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q
  • “ the ownership of ideas and control over the tangible or virtual representation of those ideas. Use of another person’s ___ may or may not involve royalty payments or permission, but should always include proper credit.”
A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Intellectual Property includes:

A

́ Trade secrets
́ Copyrights
́ Trademarks
́ Patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

́ ___ constitute a threat

A

Intellectual Property

_Breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

́ Most common breach

A

́ Software piracy
́ 1/3 of all software in use is pirated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Deliberate Software Attacks

A

́ Malicious code
́ Malicious software
́ Malware
́ First business hacked out of existence:
-́ Denial-of-service attack
́- Cloudnine:
British Internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

First business hacked out of existence:

A

-́ Denial-of-service attack
́- Cloudnine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Cloudnine

A

British Internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Segments of code

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Attaches itself to existing program

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Takes control of program access

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Replication

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Malicious program

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Replicates constantly

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Doesn’t require another program

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Can be initiated with or without the user download

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Categories of Threat

A
  • Compromises to intellectual property
  • Software attacks
  • Deviations in quality of service
  • Espionage or trespass
  • Forces of nature
  • Acts of human error or failure
  • Information extortion
  • Deliberate acts of theft
  • Missing, inadequate, or incomplete
  • Missing, inadequate, or incomplete controls
  • Sabotage or vandalism
  • Theft
  • Technical hardware failures or errors
  • Technical software failures or errors
  • Technological obsolescence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Piracy, copyright infringement

A

Compromises to intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Viruses, worms, macros, DoS

A

Software attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

ISP, power, WAN service issues
from service providers

A

Deviations in quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Unauthorized access and/or data collection

A

Espionage or trespass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Fire, flood, earthquake, lightning

A

Forces of nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Accidents, employee mistakes

A

Acts of human error or failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Blackmail or information disclosure

A

Information extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Illegal confiscation of equipment or information

A

Deliberate acts of theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Loss of access to information systems due to disk drive failure, without proper backup and recovery plan

A

Missing, inadequate, or incomplete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Network compromised because no firewall security controls

A

Missing, inadequate, or incomplete controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Destruction of systems or information

A

Sabotage or vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Equipment failure

A

Technical hardware failures or errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Illegal confiscation of equipment or information

A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Bugs, code problems, unknown loopholes

A

Technical software failures or errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Antiquated or outdated technologies

A

Technological obsolescence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Other Malware

A
  • Trojan Horse
  • Back door or trap door
  • Polymorphism
  • Hoaxes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Hide their true nature

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Reveal the designed behavior ONLY WHEN ACTIVATED

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Allows access to system at will with special privileges

A

Back door or trap door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Changes it apparent shape over time

A

Polymorphism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Makes it undetectable by techniques that look for preconfigured signatures

A

Polymorphism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Espionage or Trespass

_

_

A

Intelligence Gathering

Trespass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Protect with

A

Trespass

Authentication
Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

competitive intelligence

A

Legal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

industrial espionage

A

Illegal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q
A

Thin line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

shoulder surfing

A

one technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Protect with

A

Trespass

Authentication
Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Intelligence Gathering

A

Legal
Illegal
Thin line
One technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Hackers
́ 2 levels:

A

Experts & Novice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Develop software scripts

A

Experts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Develop program exploits

A

Experts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

́ Novice

A
  • Script kiddie
  • Packet monkeys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Use previously written software

A

Script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

́Use automated exploits

A

Packet monkeys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

System Rule Breakers

A
  • Crackers
  • Phreakers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Individuals who _ or remove software protection designed to prevent unauthorized duplication

A

Crackers

crack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Use public networks to make free phone calls

A

Phreakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Pose some of most dangerous threats

A

Forces of Nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Unexpected and occur with little or no warning

A

Forces of Nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Forces of Nature

A
  • Fire
  • Tornado
  • Tsunami
  • Electrostatic discharge
  • Dust contamination
  • Flood
  • Earthquake
  • Lightning
  • Landslide
  • Mudslide
  • Hurricane/typhoon
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q
  • ___ performed ___ intent or malicious purpose by and authorized user
A

Acts of Human Error or Failure

Acts
without

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Greatest threat to org info security

A
  • Organization’s own employees
  • Closest to the data
  • Mistakes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Mistakes

A
  • Revelation of classified data
  • Entry of erroneous data
  • Accidental deletion or modification of data
  • Storage of data in unprotected areas
  • Failure to protect information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Attacker or trusted insider steals information

A

Deliberate Acts

Information Extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Demands compensation

A

Information Extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Agree not to disclose information

A

Information Extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Deliberate sabotage of a computer system or business

A

Sabotage or Vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Acts to destroy an asset

A

Sabotage or Vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Damage to an image of an organization

A

Sabotage or Vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Hackterist or cyber activist

A

Sabotage or Vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q
  • Interfere with or disrupt systems
  • Protest the operations, policies, or actions
A

Hackterist or cyber activist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Cyber terrorism
Theft

A

Sabotage or Vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q
  • Illegal taking of another’s property
A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q
  • Illegal taking of another’s property
A

́ Physical
́ Electronic
́ Intellectual
́ Constant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

crime not always readily apparent

A

́ Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Large quantities of code written, published, and sold with bugs

A

Technical Software Failures or Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Bugs undetected and unresolved

A

Technical Software Failures or Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Combinations of software can cause issues

A

Technical Software Failures or Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Weekly patches

A

Technical Software Failures or Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Outdated hardware or software

A

Technology Obsolescence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Reliability problems

A

Technology Obsolescence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Management problem
- Should have plan in place

A

Technology Obsolescence

135
Q

Non-support of legacy systems

A

Technology Obsolescence

136
Q

Can be costly to resolve

A

Technology Obsolescence

137
Q

Attacks

A
  • IP scan and attack
  • Web browsing
  • Virus
  • Mass mail
  • Simple Network Management Protocol (SNMP)
138
Q

Infected system scans IP addresses and targets vulnerabilities

A

IP scan and attack

139
Q

Infects web content files infectious

A

Web browsing

140
Q

Infect other machines

141
Q

Infects any device that is unprotected

A

Unprotected shares

142
Q

Use common password employed in early versions of the protocol the attacking program can gain control of device

A

Simple Network Management Protocol (SNMP)

143
Q

e-mailing to all addresses in an address book

144
Q

Methods of Attack

A
  1. Social Engineering
  2. IP-Spoofing
  3. SYN spoofing
  4. Scanning
  5. Denial of service
  6. Spam
  7. Mail bombing
  8. Sniffing
  9. Man-in-the-Middle
145
Q

Methods of Attack

A

́ - Password Crack
- Brute force
- Dictionary

146
Q

The design of the network infrastructure and communication protocols are a major contributor

A

Methods of Attack

147
Q

IP address of the source element of the data packets are altered and replaced with bogus addresses

A

IP-Spoofing

148
Q

́ The server is overwhelmed by spoofed packets

A

SYN spoofing

149
Q

Way of determining which ports are open and can be used

150
Q

Smurf send large amount of spoofed ping packets

A

Denial of service

151
Q

Overwhelms the system

A

Denial of service

152
Q

Can stop response

A

Denial of service

153
Q

Monitors data traveling over a network

154
Q

legitimated and non legitimate

155
Q

Packet sniffing

156
Q

Monitors or sniffs packets from network

A

Man-in-the-Middle

157
Q

Modifies the packets

A

Man-in-the-Middle

158
Q

Inserts them back into the network

A

Man-in-the-Middle

159
Q

Allows attacker to eavesdrop, change, delete, reroute, add, or divert data

A

Man-in-the-Middle

160
Q

́ Variant
___ involves the interception of an encryption key exchange

A

Man-in-the-Middle

Spoofing

161
Q
  • There is an imbalance between our abilities as developers and the abilities and resources of the attacker.
A

Programming Errors

162
Q
  • Software can be correct without being secure.
A

Programming Errors

163
Q
  • ___ of software security bugs come from ___,well-understood’ programming mistakes
A

Programming Errors

95 percent
19 ‘common

164
Q
  • Explores the contents of a web browser’s cache
A

Timing Attack

165
Q
  • Allows a Web designer to create a malicious form of cookie that is stored on the client’s system
A

Timing Attack

166
Q
  • __ allow designer to collect information on how to access password protected sites
A

Timing Attack

Cookie

167
Q

Cyberattacks only target large organizations and governments; individuals are safe from such threats

168
Q

Using strong, complex passwords for all accounts is enough to ensure complete cybersecurity.

169
Q

Regularly cleaning browser history and cookies ensures complete online privacy and protection

170
Q

Online shopping is safer when using public Wi-Fi networks because they are encrypted

171
Q

Strong passwords are characterized by their complexity, including a mix of uppercase and lowercase letters, numbers, and special characters.

172
Q

___ is a technique that manipulates individuals into revealing confidential information or performing actions that compromise security.

A

Social engineering

173
Q

Regularly updating your software and operating systems is an effective way to protect against known vulnerabilities and security threats

174
Q

Malware is always spread through email attachments; downloading files from websites is always safe.

175
Q

Cybersecurity measures only involve technology; human behavior doesn’t play a significant role.

176
Q

__ transforms data into a coded format that can only be deciphered with the appropriate decryption key.

A

Data encryption

177
Q

Regularly backing up data to an external source or cloud storage is essential to ensure data recovery in the event of hardware failure or a cyberattack.

178
Q

A ___ can provide a secure and private connection by encrypting internet traffic and masking the user’s IP address.

A

VPN(Virtual Private Network)

179
Q

A ___ is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.

180
Q

Two-factor authentication (2FA) involves using two different passwords to access an account

181
Q

Once a file is deleted from a computer, it is permanently gone and cannot be recovered.

182
Q

Antivirus software is enough to protect a computer from all types of malware and cyber threats

183
Q

Multi-factor authentication (MFA) requires users to provide two or more different authentication factors to access an account.

184
Q

Once you delete a post or photo from a social media platform, it’s permanently removed from the internet.

185
Q

Phishing emails are always easy to spot due to poor grammar and spelling mistakes.

186
Q

Using “incognito” or “private browsing” mode in a web browser guarantees complete anonymity and privacy while browsing the internet.

187
Q

is the practice of protecting systems, networks, and programs from digital attacks

A

Cybersecurity

188
Q
  • A ___ has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe.
A

successful cybersecurity

189
Q

These ___ are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.

A

cyberattacks

190
Q

In an __, the people, processes, and technology must all complement one another to create an effective defense from cyber-attacks.

A

organization

191
Q

A __ can automate integrations across select Cisco Security products and accelerate key security operations

A

unified threat management system

192
Q

key security operations functions:

A

detection, investigation, and remediation

193
Q

is not only about securing information from
unauthorized access

A

Information security

194
Q

Information Security programs are built around 3 objectives, commonly known as __

A

CIA – Confidentiality, Integrity, Availability.

195
Q

is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information

A

Information security

196
Q

A primary way to avoid this is to use __ to safeguard your data so that even if the attacker gains access to your data, he/she will not be able
to decrypt it.

A

encryption techniques

197
Q

means that only the authorized individuals/systems can view sensitive or classified information

A

Confidentiality

198
Q

Encryption standards include:

A

AES(Advanced Encryption Standard) DES (Data Encryption Standard)

199
Q

Another way to protect your data is through a __.

A

VPN tunnel

200
Q

_ and helps the data to move securely over the network

A

VPN stands for Virtual Private Network

201
Q

making sure that data has not been modified

202
Q

__ is a failure to maintain data integrity.

A

Corruption of data

203
Q

To check if our data has been modified or not, we make use of a __.

A

hash function

204
Q

This means that the data should be readily available to its users.

A

Availability

205
Q

__ may render a network unavailable as the resources of the network gets exhausted.

A

Attacks such as DoS or DDoS

206
Q

To ensure __, the network/system administrator should maintain hardware, make regular upgrades, have a plan for fail-over and prevent bottleneck in a network.

A

availability

207
Q

The Parkerian Hexad Added The
Following Three Additional Elements:

A
  • Authenticity
  • Possession
  • Utility
208
Q

refers to the veracity of the claim of origin or authorship of the information.

A

Authenticity

209
Q

For example, one method for verifying the authorship of a hand written document is to compare the handwriting characteristics of the document to a sampling of others which have already been verified. For electronic information, a digital signature could be used to verify the authorship of a digital document using __ (could also be used to verify the integrity of the document)

A

public-key cryptography

210
Q

means usefulness

211
Q

__ invented the PC in the late ’70s but needed an__

A

IBM
operating system

212
Q
  • _ had never written an OS but accepted the challenge
213
Q

_ had an OS but turned them down

A

Digital Research

214
Q

IBM went to a small company (__) that had created __

A

Bill Gates at Microsoft
BASIC

215
Q

Microsoft released it as __

A

MS-DOS V 1.1 (Microsoft Disk Operating System)

216
Q

Gates found an OS called _ and purchased it from the person who wrote it

A

Quick-and-Dirty-Operating-System (QDOS)

217
Q

___ ultimately released in 1994

A

MS-DOS 6.22

218
Q

MS-DOS 6.22__

219
Q

_ used a command-line interface

220
Q

How does a command-line interface work?
* Begins with a __ indicating the computer is ready to do something
* Type in a command and press ENTER
* The command is executed

  • A new prompt is displayed—ready for the next command
221
Q
  • CLI executes commands like the __
A

Windows GUI

222
Q

In __, type the command and press ENTER

223
Q

In __, point and click to execute commands

224
Q

Accessing the Command Line
* In Windows 2000 use the __
* Start | Run
* Type _
* You may also access the command line through the Start | All

A

Run dialog box
cmd

225
Q
  • The _ is always focused on a specific folder
A

command prompt

226
Q
  • _ operate on the files and folders in the folder in which you are focused
A

Any commands

227
Q
  • You must first focus on the __ where you want to work
A

drive and folder

228
Q

Filenames and File Formats

  • Each _ is stored as a file on the drive
A

program or piece of data

229
Q
  • Filenames have two parts:
A
  1. Filename
  2. Extension
230
Q
  • In _, up to 8 characters long
231
Q
  • In _, up to 3 characters long
  • Optional
232
Q
  • The filename and extension are separated by a ______
    - Called the _____
A

dot
8.3 naming system

233
Q
  • These characters may not be used
A

/ \ [ ] | ÷ + = ; , * ? (special characters)

234
Q
  • Windows does not restrict the __ to __ (can be up ___ characters)
A

filename
8.3
255

235
Q
  • To be __ with DOS you need to follow the 8.3 standard
A

backward-compatible

236
Q
  • Windows creates two filenames for every file to ensure __
A

backward- compatibility

237
Q
  • The ___ tells the computer the type of file
A

extension
* .exe, .doc, .xls

238
Q

File Formats
* All files written in __

A

binary format

239
Q

File Formats
* __used for text
1.
2.

A

American Standard Code for Information Interchange (ASCII)
1. Universal file format
2. Defines 256 8-bit characters

240
Q

Uses 16-bit code to cover every character for the most common languages

241
Q

Drives and Folders
* At __, Windows assigns partitions and a drive letter
*
*
*

A

boot
* Floppy drives
* Hard drive
* CD-ROM drives

242
Q

are usually assigned A: or B:

A

Floppy drives

243
Q

partitions may be assigned C: to Z:

A

Hard drive

244
Q

are named after hard drives

A

CD-ROM drives

245
Q

Windows uses a __

A

hierarchical directory tree

246
Q
  • Files are put into groups called ___
247
Q
  • In DOS we call folders _
A

directories

248
Q

The _ is at the beginning of the hierarchical structure with folders underneath

A

root directory

249
Q
  • Folders and files must be _
    - Can’t be the same name in the same folder
250
Q

represents the root directory of C

251
Q
  • To describe a subfolder, add the ___
A
  • C:\TEST

name of the folder

252
Q

The location of a file is called the __

A

path
* The path of C:\test\file.txt is C:\test

253
Q
  • The __ requires the exact syntax for each command
A

command line

254
Q
  • Type the name of the command and desired or allowed __
255
Q
  • _ modify the behavior of the command
256
Q
  • Multiple switches may be _
257
Q

Displays the directory in wide mode and one page at a time

258
Q
  • Help with any command is readily available in __
A

one of three ways

259
Q

one of three ways

A

HELP
HELP command
Command/?

260
Q

gives a one-line description of each command

261
Q

gives specific help for the command

A

HELP command

262
Q

gives specific help for the command

263
Q

The _ lists the contents of a particular directory

A

DIR command

264
Q
  • The __ command lists only the filenames
265
Q

The __ command is used to change the focus to a different directory

A

CD (or CHDIR)

266
Q
  • The _ command is used to return to the root directory
267
Q

Goes up one directory

268
Q
  • To switch between drives, type the drive letter followed by a colon
269
Q
  • The __ command is used for creating a directory
A

MD (or MKDIR)

270
Q

The __ command is used for deleting files

271
Q

__ command is used for deleting directories and subdirectories

A

RD (RMDIR)

272
Q
  • The __ command is used for deleting directories containing
    files and subdirectories
273
Q

To run a program:
* __ focus to the directory where the program is stored
* Type the filename with or without its _ and press ENTER

A

Change the DOS
CD C:\Program Files\My Program

extension
Setup.exe

274
Q

Working with Files
_ (_ , _, _, _) are special values assigned to a file

A

Attributes (H, R, S, A)

275
Q

hides the file

276
Q

protects a file from being deleted or modified

277
Q

identifies system files

278
Q

identifies files that have not been backed up

279
Q

The _ program is used to inspect and change file attributes

A

ATTRIB.EXE

280
Q

can be used to change the attributes

281
Q
  • Use _ to add attribute
282
Q
  • Use _ to remove attribute
283
Q

_ AILOG.TXT Makes it read only

284
Q

__ AILOG.TXT Makes it no longer hidden

A

Attrib –H

285
Q

are special characters that enable commands to act on more than one file at a time

286
Q

The _ represents any number of characters

287
Q

The _ represents a single character

288
Q

_ command is used to rename files

289
Q
  • _ commands are used to delete files
A

DEL and ERASE

290
Q
  • _ command is used for making a copy of the file in a new location
291
Q
  • _ command is used for moving the file to a new location
292
Q
  • _ command is used for working with multiple directories
293
Q

Five-Step COPY/MOVE Process
1. Point the command prompt to the directory containing the files to be copied or moved
_____

  1. Type COPY or MOVE and a space
    _________
  2. Type the name(s) of the file(s) to be copied/moved and a space
    ____
  3. Type the path of the new location for the files
    ______
  4. Press ENTER
A

C:> CD \DOCS
C:\DOCS> COPY
C:\DOCS> COPY *.doc
C:\DOCS> COPY *.doc c:\Steam

294
Q
  1. What is the most serious
    vulnerability in a computing system?
    A) The most complex point
    B) The weakest point
    C) The newest technology
    D) The most secure feature
295
Q
  1. Which term describes unauthorized
    access to information in a security
    breach?
    A) Disruption
    B) Usurpation
    C) Deception
    D) Disclosure
296
Q
  1. Which security component ensures
    that assets are accessible only by
    authorized parties?
    A) Integrity
    B) Availability
    C) Confidentiality
    D) Authentication
297
Q
  1. Which type of control is usually the first aspect of computer security that comes to mind?
    A) Hardware controls
    B) Software controls
    C) Physical controls
    D) Encryption
298
Q
  1. Which method is at the heart of all
    security methods and ensures
    confidentiality of data?
    A) Encryption
    B) Software controls
    C) Physical controls
    D) Policies
299
Q
  1. Which term refers to the
    unauthorized control of some part of the system during a security breach?
    A) Usurpation
    B) Disruption
    C) Disclosure
    D) Deception
300
Q
  1. Which of the following is NOT a
    software vulnerability?
    A) Logic bomb
    B) Virus
    C) Encryption
    D) Trapdoor
301
Q
  1. What is the purpose of risk analysis
    in operational security issues?
    A) To assess financial benefits
    B) To prevent legal issues
    C) To determine the level of protection
    required
    D) To enhance social engineering
    techniques
302
Q
  1. Which type of security breach
    involves the modification of data?
    A) Disruption
    B) Deception
    C) Usurpation
    D) Disclosure
303
Q
  1. What is malware?
    A) Software designed for a good
    purpose
    B) Software designed for a nefarious purpose
    C) Hardware that is vulnerable to
    attacks
    D) A virus that spreads through emails
304
Q
  1. Which of the following is NOT a type
    of malicious software?
    A) Virus
    B) Trojan horse
    C) Worm
    D) Patch
305
Q
  1. What is a worm?
    A) A piece of code that attaches itself to another program
    B) A piece of code that attempts to
    penetrate networks and systems
    C) Software that spies on users
    D) Software supported by advertising
306
Q
  1. Which type of malware changes its code to avoid detection?
    A) Virus
    B) Worm
    C) Polymorphic malware
    D) Logic bomb
307
Q
  1. What is a Trojan horse?
    A) A program that replicates itself
    B) A program that appears to do one
    thing but hides malicious activities
    C) A piece of code that sits dormant
    until triggered
    D) Software that spies on users
308
Q
  1. What is a rootkit designed to do?
    A) Modify the operation of the operating system
    B) Replicate itself by attaching to
    another file
    C) Spy on users
    D) Encrypt files for ransom
309
Q
  1. What are backdoors originally used
    for?
    A) Encrypting files for ransom
    B) Replicating viruses
    C) Gaining access to an application if normal access is blocked
    D) Modifying the operating system
310
Q
  1. What triggers a logic bomb?
    A) When a user logs into a specific
    website
    B) When specific conditions are met
    C) When a document is attached to an email
    D) When a system is patched
311
Q
  1. What are botnets?
    A) Networks of machines used to
    conduct attacks and spread malware
    B) Standalone programs that need to be installed by users
    C) Software that spies on users
    D) Programs that encrypt files for
    ransom
312
Q
  1. What is a denial-of-service (DoS)
    attack?
    A) An attack designed to steal user
    data
    B) An attack designed to prevent a
    system or service from functioning
    normally
    C) An attack that modifies the operating system
    D) An attack that encrypts files for
    ransom
313
Q
  1. What is social engineering?
    A) A type of malware that replicates
    itself
    B) A method of manipulating people
    into divulging confidential
    information
    C) A technique used to encrypt files for
    ransom
    D) A way to spy on user activities
314
Q
  1. What does a network sniffer do?
    A) Encrypts files for ransom
    B) Monitors and analyzes network
    traffic
    C) Replicates itself by attaching to other files
    D) Modifies the operating system
315
Q
  1. What is session hijacking?
    A) Monitoring network traffic
    B) Taking control of a user session by stealing session cookies
    C) Encrypting files for ransom
    D) Modifying the operating system
316
Q
  1. What is a botnet?
    A) A single machine used for attacking a network
    B) A network of compromised
    machines used to perform
    coordinated attacks
    C) A type of virus that attaches to
    executable files
    D) A type of software that spies on
    users
317
Q
  1. What is a common defense against man-in-the-middle attacks?
    A) Encrypting all sensitive
    communications
    B) Never updating software
    C) Disabling all network connections
    D) Running an antivirus program
318
Q
  1. What is the primary goal of
    cybersecurity?
    A) To increase system speed
    B) To protect systems, networks, and programs from digital attacks
    C) To improve software performance
    D) To manage hardware resources
319
Q
  1. What are the three objectives of the CIA Triad in information security?
    A) Confidentiality, Integrity, Availability
    B) Confidentiality, Identity,
    Authentication
    C) Integrity, Availability, Utility
    D) Integrity, Confidentiality, Usability
320
Q
  1. What does confidentiality in the CIA Triad refer to?
    A) The ability to access data quickly
    B) Ensuring that data is only accessible to authorized individuals
    C) The accuracy of data
    D) The usability of the data
321
Q
  1. What is meant by data integrity?
    A) Ensuring data is available when
    needed
    B) Ensuring data has not been modified
    C) Ensuring data is confidential
    D) Ensuring data can be easily
    accessed
322
Q
  1. Which tool is commonly used to
    check if data has been modified?
    A) Firewall
    B) Hash function
    C) Antivirus
    D) VPN
323
Q
  1. What does availability in the CIA
    Triad ensure?
    A) Data is kept confidential
    B) Data is accurate
    C) Data and systems are available to authorized users when needed
    D) Data is encrypted
324
Q
  1. What additional element in the
    Parkerian Hexad refers to verifying
    the origin of information?
    A) Possession
    B) Authenticity
    C) Utility
    D) Confidentiality
325
Q
  1. In the context of the Parkerian
    Hexad, what does possession or
    control mean?
    A) Data can be accessed by authorized users
    B) Data can be modified by authorized users
    C) Ownership or control of the data is at risk, even if the data is not accessed
    D) Data is kept confidential and
    unmodified
326
Q
  1. What does utility refer to in the
    Parkerian Hexad?
    A) The usefulness of data
    B) The ability to encrypt data
    C) The availability of data
    D) The security of data
327
Q
  1. What is the purpose of the DIR
    command in the CLI?
    A) Change directory
    B) Delete files
    C) List the contents of a directory
    D) Rename files
328
Q
  1. Which command is used to change
    the focus to a different directory?
    A) CD
    B) DIR
    C) DEL
    D) COPY
329
Q
  1. Which symbol in the CLI represents
    any number of characters?
    A) ?
    B) ***
    C) #
    D) &
330
Q
  1. How do you return to the root
    directory in DOS?
    A) CD
    B) CD ..
    C) DIR
    D) DEL
331
Q

Question: (38-40)
You need to create a new folder named Reports on your computer’s D: drive, move into that folder, and then create a text file named summary.txt with some initial
content. After that, you want to move summary.txt to another folder called Archived.

  1. How would you create the Reports directory on the D: drive and navigate into it?
    A) REM Reports followed by CD
    D:\Reports
    B) MD D:\Reports followed by CD
    D:\Reports
    C) MOVE Reports followed by CD
    D:\Reports
    D) COPY CON Reports followed by CD D:\Reports
332
Q
  1. How would you create a file named summary.txt and start editing it using the command line?
    A) MOVE summary.txt
    B) COPY CON summary.txt
    C) CD summary.txt
    D) REM summary.txt