Cyber Sec Exam Flashcards

1
Q

Ransomware

A

Encrypts data then demands payment or information in order to receive it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Keylogger

A

Tracks Keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spyware

A

Monitors devices secretly and potential control of the device in places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

Steals information from people while pretending to be something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stealth Backdoor

A

Entering through intentional holes in the system left by attackers to secretly bypass security procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rootkit

A

A set of programs installed on a system to maintain covert access to that
system with administrator (or root) privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack Agents

A

Take over another internet attached computer and use it to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Payload

A

The main action that the virus or malware is built to carry out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Clickjacking

A

Clickjacking is a malicious technique used by attackers to trick users into clicking on something different from what they perceive they are clicking on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malvertising

A

Malware placed on websites without infecting them typically in advertisements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Drive-by downloads

A

This type of attack typically occurs when a user visits a compromised or malicious website, and the malicious code is automatically downloaded and executed in the background. This exploits issues in the browser or OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Watering Hole attacks

A

A targeted form of a drive-by download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan

A

Malware that disguises itself as a not malicious program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Worms

A

Seeks out other files while infecting as much as possible. Can spread through network connections and files based on the goal condition that is set for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Metamorphic virus

A

A virus that mutates and rewrites itself completely at each iteration and may change behavior as well as appearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Polymorphic virus

A

A virus that mutates with every infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Stealth virus

A

A form of virus explicitly designed to hide itself from detection by anti-virus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Encrypted virus

A

A portion of the virus creates a random encryption key and encrypts the remainder of the virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Virus

A

Infects software and modifies, replicates and spreads upon a condition being met. Examples such as logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Logic Bomb

A

A virus which activates upon certain conditions being met such as a date/time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Attack Kit

A

Malware kits used to create malware. Examples such as Zeus and Angler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the difference between worms, viruses and Trojans?

A

how they spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is social engineering

A

“tricking” users to assist in the compromise of their own systems or personal
information. This can occur when a user views and responds to some SPAM
e-mail, or permits the installation and execution of some Trojan horse program or
scripting code. E.g trojans, spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Brute Force

A

Guessing every individual combination of a password or key till the correct combination has been found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a hash function and what do they do?

A

The purpose of a hash function is to produce a “fingerprint” of a file, message, or other block of data.
Ensures file integrity, increases security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Rainbow Table

A

Logs common passwords and the corresponding pre-computed hashes from dictionary’s on a table. When receiving a hashed password they can then find the corresponding plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Dictionary Attack

A

Systematically attempting to guess a password or key based on the most likely possibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Authenticity

A

making sure people are who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Authorization

A

determines whether an entity or person is permitted to access information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Accountability

A

intrusion detection and prevention and after-action recovery and legal action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Plaintext

A

the original data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Encryption algorithm

A

Performs various actions on the plaintext to warp it and make it harder to guess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Secret Key

A

the key used to decrypt the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Ciphertext

A

The plaintext after the algorithm has been applied to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Decryption Algorithm

A

works in the opposite way to the encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Symmetric encryption

A

Uses a single key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Asymmetric encryption

A

Asymmetric encryption, also known as public-key encryption, uses a pair of keys: a public key and a private key. The public key is used for encryption, while the private key is used for decryption. The public key can be freely distributed, while the private key is kept secret. Messages encrypted with the public key can only be decrypted by someone who possesses the corresponding private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Cost benefit analysis

A

Weighs whether an option is worth it or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What should an IT security plan include:

A

What will be done, what resources and who is responsible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Name the 3 Control Classifications

A

Management, Operational and Technical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Management control

A

focuses on the policies, planning and guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Operational controls

A

Address the correct implementation and use of security policies. Relate to people rather than systems

43
Q

Technical Controls

A

involve the correct use of hardware and software security in systems.

44
Q

Supportive controls

A

Pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls

45
Q

Preventative controls

A

Focus on preventing security breaches from occurring, by inhibiting attempts to violate security policies or exploit a vulnerability

46
Q

Detection and recovery controls

A

Focus on the response to a security breach, by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources

47
Q

Residual Risk

A

Lowering likelihood, impact or capability reduces the level of a risk

48
Q

What does a Implementation Plan consist of

A

security plan documents, identified personnel and authorization for the system to be used.

49
Q

is security management cyclical?

A

Yes and it needs to be constantly monitored and evaluated

50
Q

Security Compliance

A

audit process to review security processes and ensure they are up to standard

51
Q

Change management

A

the process used to review proposed changes to systems for
implications on the organization’s systems and use.

52
Q

IT security management

A

A process used to achieve and maintain
appropriate levels of confidentiality, integrity, availability, accountability,
authenticity, and reliability.

52
Q

Configuration management

A

specifically keeping track of the
configuration of each system in use and the changes made to each

53
Q

What does PDCA stand for?

A

Plan, do, check and act

54
Q

Whatis mandatory to implement Management Support

A

Needs senior management, a security officer

55
Q

What makes up a security risk assessment?

A

critical component of process, ideally examine every organizational asset, approach to mitigate the risks

56
Q

Baseline Approach

A

Use industry best practice to implement agreed controls against common threats

57
Q

Informal approach

A

Informally analyze a it system and make quick judgements

58
Q

What are the pros and cons of
Detailed risk analysis

A

Most comprehensive approach but takes the longest and costs the most

59
Q

combined approach

A

hybrid of all 4 other analysis methods

60
Q

Asset

A

A system resource or capability of value

61
Q

Threat

A

A potential for a threat source to exploit a vulnerability

62
Q

Vulnerability

A

A flaw or weakness in a assets design

63
Q

Risk

A

The potential for loss

64
Q

Risk appetite

A

the level of risk which is considered acceptable

65
Q

What is important with regards to the context of an organization

A

the political and social environment they are in.

66
Q

formula for risk

A

Risk = probability threat occurs x cost to organization

67
Q

Logical Security

A

Protects computer-based data from software-based and
communication-based threats

68
Q

Physical Security

A

Also called infrastructure security
Protects the information systems that contain data and
the people who use, operate, and maintain the systems
Must prevent any type of physical access or intrusion
that can compromise logical security. Physical Security
can also cover premises security

69
Q

3 types of threats based on physical security

A

environmental, human and technical

70
Q

what could water damage cause

A

electrical shortage

71
Q

how can chemical, radiological and biological be caused?

A

Accidental discharges, flooding

72
Q

How can dust collect and impact?

A

blocks ventilation and can be caused by windstorms and maintenance

73
Q

Infestation

A

Humidity can cause mold and mildew, also insects can be dealt with pest control

74
Q

List the main technical threat

A

Power utility problems from incorrect amount of voltages

75
Q

Name some human caused threats

A

theft, vandalism, misuse of resources

76
Q

How to mitigate water damage

A

Cloud computing, manage lines, cutoff sensors and equipment location

77
Q

how to mitigate fire and smoke?

A

alarms, fire mitigation, smoke detectors, no smoking policy

78
Q

How to mitigate human based threats

A

Restrict building access, lock entry points, intruder sensors, the standards

79
Q

Recovery from security breaches

A

Ensure data is backed up, may require specialists to deal with damage to equipment

80
Q

Security audit

A

A review of system records and activities to ensure system controls are up to standard and adjust it accordingly based on any issues

81
Q

Audit Trail

A

A chronological record of system activities

82
Q

What is needed for event detection?

A

monitoring software, analysis software as well as hooks and analysis software hooked up

83
Q

What to audit

A

anything relating to access of the system, security mechanisms and the auditing software itself

84
Q

what are physical audit trails

A

key card system, logs access attempts as well as date/time info for example

85
Q

how to protect audit trail data

A

read write file on host, write once/read many device. Write only device. Implement CIA

86
Q

Logging

A

Software with hooks which trigger data collection and predetermined events

87
Q

what are the 3 types of event logs

A

system application security

88
Q

Name methods of authentication

A

biometrics, pins, key

89
Q

Biometrics

A

Something completely unique to you such as anamtomy, handwriting or voice

90
Q

Name behavioural biometrics

A

voice, handwriting

91
Q

name physiological biometrics

A

fingerprints, veins, retina

92
Q

Confusion matrices

A

false positives/negatives in information retrieval

93
Q

3 types of authentication architecture

A

transparent, continuous and convenient

94
Q

Transparent architecture

A
  • Non-intrusive
  • Maintains usability
  • Seamless experience for the end-use
95
Q

Continuous Architecture

A
  • improved security for mobile devices
  • Multi-modal transparent authentication architectur
96
Q

Convenient authentication

A

Application specific authentication

97
Q

Confidence level

A

Due to the fact biometrics are not perfect there is a threshold of error which it has with regards to a match to determine if it authorises

98
Q

Feature Extraction

A

the process of collecting the biometric data via specialist technology e.g sensors

99
Q

Discretionary Access Control

A

Based on identity of the requestor and on access rules stating what the requestors are allowed to do

100
Q

Role based access control (RBAC)

A

Controls access based on the roles
that users have within the system
and on rules stating what accesses
are allowed to users in given roles

101
Q

Mandatory access control (MAC)

A

Controls access based on comparing
security labels with security
clearances

102
Q

Attribute-based access control (ABAC)

A

Controls access based on attributes
of the user, the resource to be
accessed, and current
environmental conditions