cyber security Flashcards

1
Q

network analytics does what

A

improve security
fine tunes network performance
predicts trends
preform forensic investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

net work analytics are most useful to organizations with

A

complex networks
overtaxed networks
networks that have high level security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SQL injection

A

occurs on data base driven websites/allows tables to be edited or deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cyber attack results in

A

reputation damage
financial/business loss
data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how many times do attacks attack

A

every 39 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

different types of cybercrime

A

computer target of crime
computer assisted crime
target idetical to crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

integrity

A

data can only be added altered or removed by a authorized party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sony’s PlayStation attack

A

affected 77 million users and stopped them from using services for 23 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

domains of cyber security

A

asset security
identity and access management
asset security
communication network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Adam Botbyl

A

stole credit score information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

davis L Smith

A

created melissa virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cyber terrorist

A

someone who attacks for political/religious reasons. usually inflicts fear with large scale disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hactivist

A

someone who promotes political agenda by defacing a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the CEH consist of

A

network/info background
procedure methology
security
ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

areas of penetration hacking

A

network services
web applications
social engineering
wireless
client side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

active Metasploit

A

targets specific computer
runs until execution
usually with brute force

17
Q

passive metasploit

A

waits for request
then attacks
usually with phisisng

18
Q

features of Kia Linux

A

over 60 tools
wide range wireless support
mass customization
open source