CPE 046 Flashcards

1
Q

ıs a multıtaskıng operatıng
system used on most Cısco routers
and swıtches.

A

IOS (Internetwork Operatıng
System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IOS

A

(Internetwork Operatıng
System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ıs used to
confıgure routıng, swıtchıng,
ınternetworkıng and other features
supported by a Cısco devıce.

A

IOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

thıs type of access ıs usually used to confıgure newly
acquıred devıces. These devıces usually don’t have an IP address confıgured,
and therefore cannot be accessed through the network.

A

Console access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

thıs type of access used to be a common way to access network devıces. ________ ıs a termınal emulatıon program that enables you to access IOS through the network and confıgure the devıce remotely. Uses
TCP port 23

A

Telnet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

– lıke Telnet, thıs access type enables you to confıgure devıces
remotely, but ıt adds an extra layer of securıty by encryptıng all
communıcatıons usıng publıc-key cryptography. SSH uses well known TCP
port 22.

A

SSH access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IOS Command Hierarchy

A

User EXEC COMMANDS
PRIVILEGED EXEC COMMANDS
Global Configuration Commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Configuration Mode

A

Interface
Subinterface
Controller
Map-list
Map-class
line
router
ipx-router
route-map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is the practice of protecting systems,
networks, and programs from digital attacks.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Pillars of Cybersecurity

A

Best Practices
Policies & Procedures
Products & Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You set up a new network for a growing company, but you don’t
follow all of the recommended cybersecurity best practices. While you may have invested in robust security products, they can be easily subverted by _________________

A

failure to follow best practices.

or

Best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples: Acceptable use policies, employee training.

Failure Example: Deploying a content filter without training employees, leading to risky behavior.

A

Policies & Procedures:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples: Firewalls, antivirus software, maintenance subscriptions.

Failure Example: Skipping security service licenses, leaving systems vulnerable to zero-day attacks.

A

Products & Services:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples: Locking doors (analogous to securing networks), using strong passwords, updating firmware.

Failure Example: Installing robust security tools but using weak passcodes (e.g., “1234”).

A

Best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIA TRIAD

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confidential information is kept secret to prevent: identity theft,
compromised accounts and systems, legal concerns, damage to
reputation, and other severe consequences.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MFA

A

multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data is one of the most valuable assets a company can have, but it is not static. It can be transferred to other systems, altered, and
updated multiple times.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____________ guarantees that data is accurate, complete, and consistent.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It covers data in storage, during processing, and in transit. Without data integrity, loss, corruption, or compromise can cause significant damage and financial loss for both businesses and customers.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The two main types of data integrity are:

A

Physical data integrity
Logical data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is the collection of actions and fail-safes that
protect the physical systems that store and process the data.

A

Physical data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

are the checks and protocols that protect data
from human error and hackers. These confirm that data is correct and
accurate as it’s used in different ways within an organization

A

Logical data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

means that authorized users have immediate and
reliable access to their data. This includes granting access to
authorized users with passwords and security questions.

A

Data availability or Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Some of the most fundamental threats to availability are non-
malicious, including:

A

hardware failures,
unscheduled software downtime,
network bandwidth issues.

26
Q

NIST(National Institute of Standards and Technology) Cybersecurity Framework

A

Identity
Protect
Detect
Respond
Recover

27
Q

what processes and assets need protection?

28
Q

Implement appropriate safeguards to ensure protection of the enterprise’s assets

29
Q

Implement appropriate mechanisms to identify the occurrence of cybersecurity incidents

30
Q

Develop Techniques to contain the impacts of cybersecurity events

31
Q

Implement the appropriate processes to restore capabillities and service impaired due to cybersecurity events

32
Q

Weak security policies can lead to physical threats, tampering, or the
theft of hardware.

A

Hardware Threats

33
Q

is the art of unlocking the lock by analyzing and manipulating the components of the lock device, without an original key.

A

Lock Picking

34
Q

Threats and Breaches

A

Hardware Threats
Data Threats
Data Leaks & Data Breaches
Data Dumps
Dumpster Diving
Software Threats

35
Q
  • Unpatched systems, misconfigured firewalls, weak cybersecurity, and
    weak physical security are just a few ways that data threats occur
  • Data Leaks & Data Breaches.
  • Data Dumps
  • Dumpster Diving
A

Data Threats

36
Q

are the accidental exposure of confidential or sensitive
data through a security vulnerability.

A

Data leaks

37
Q

are when a data leak is caused intentionally by a
cybercriminal. These occur when social engineering or phishing
attacks trick employees into leaking sensitive credentials or
information.

A

Data breaches

38
Q

are when cybercriminals dump (release) stolen data onto
the dark web for monetary gain.

A

Data Dumps

39
Q

is the act of physically searching through a literal
dumpster to find something valuable.

A

Dumpster diving

40
Q

Tech companies require ______________________ as a normal part of business because these can be stolen from the
trash to harvest data that can be used for identity theft and data
breaches, or the data could be sold to hackers, or a company’s
competitors.

A

document shredding and device destruction

41
Q

include theft, exploits, and malware.

A

Software Threats

42
Q

is the unauthorized copy or use of
copyright-protected software. This includes pirating software and
counterfeiting activation codes.

A

Software or license theft

43
Q

are pieces of code that use vulnerabilities in hardware or
software to get into a system.

44
Q

Malware-infected websites use exploits

to automatically download malware to a system. This is called _______

A

drive by download.

45
Q

Malware

A

Malicious Software

46
Q

is a general term for software designed to compromise
computer systems. Malware can cause system slowdowns, odd
requests, browser misdirection, popup ads.

47
Q

It can also steal data, record everything you do with or near your device, spam your contacts with infected links, and connect your computer to a network of hijacked computers that are remotely controlled (known as a ______).

A

Malware
botnet

48
Q

Malware can come from:

A
  • attachments
  • sketchy websites
  • file downloads
  • infected USB drives
  • links in emails, ads, social media, torrents, and even text messages
49
Q

Malware Types

A

Program viruses
Macro viruses
Stealth viruses
Polymorphic viruses
Worms
Trojans
Spyware
Adware
Ransomware

50
Q

are bits of code that insert themselves into another
program.

A

Program viruses

51
Q

affect Microsoft Office files via the macros they use to
automate tasks.

A

Macro viruses

52
Q

copy themselves to different locations to avoid antivirus
scans.

A

Stealth viruses

53
Q

change their characteristics to get around cybersecurity defenses. 97% of all malware uses polymorphic viruses.

A

Polymorphic viruses

54
Q

start themselves after identifying system weaknesses. They don’t
rely on apps or files. Unlike other viruses, worms can be controlled
remotely. A computer worm replicating itself aims to make copies that can infect other computers. While most malware is isolated to the infected device, worm viruses are designed to spread to other devices.

55
Q

trick you into installing legitimate-seeming software that
includes harmful malware.

56
Q

collects personal data, login credentials, credit card information, online activity, and can record using a device’s camera or microphone.

57
Q

is software coded into online ads that records your personal
data, website visits, and keystrokes to send you personalized ads. Both
adware and spyware can be legitimate or malicious.

58
Q

locks a system, encrypts its files, and displays a ransom demand. To get the encryption key you must pay the ransom, or you can regain access by doing a full system restore from a backup.

A

Ransomware

59
Q

EICAR

A

The European Institute for Computer Antivirus Research

60
Q

The European Institute for Computer Antivirus Research
(EICAR) has developed a test virus to test your antivirus
solution. This script is an inert text file. The binary
pattern is included in the virus pattern file from most
antivirus vendors. The test virus is not a virus and does
not contain any program code.

A

Sample Virus