Essential Security Principles Flashcards

1
Q

What term refers to the combined sum of all potential threat vectors and defense in debt security?

A

Attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are completing a college admissions application online. When navigating to the next page in the application, the website becomes unresponsive and appears to crash. You attempt to refresh the admissions page, but you get a generic browser error and cannot access your application. What part of the CIA triad has been compromised?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the key characteristic of a cyber security defense-in-depth definition?

A

Multiple overlapping layers of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You receive an email from your teacher that has a link to a class poll for a pizza party. You click the link which takes you to the school portal. To log in later, you discovered this was a phishing email and your credentials were stolen.Which part of the CIa triad was compromised in this attack?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which part of the CIA triad is exploited when shoulder surfing occurs?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which part of the CIA triad is exploited when shoulder surfing occurs?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A major power surge occurs in the middle of making authorized changes to the company payroll server, which results in equipment failure. The equipment is replaced and the data is restored from a previous good backup, which part of the CIA triad was preserved?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the term to describe a weakness in a computer device system or network?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______ is the possibility of an attack

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______is a weakness in the system.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______is an actual attack.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

________is a program that gives attackers a way to regain access after an attack.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_________ is a pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities.

A

Attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ is a network of devices infected with malicious software.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________is an attack used to access encrypted data.

A

Cryptographic attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______ usually establishes a barrier between a trusted internal network and an untrusted external network.

17
Q

_______ is determined by the likelihood or potential of a threat being carried out.

18
Q

_______ is a type of malware.

A

Cryptoworm

19
Q

________ is malicious software that prevents a company from accessing its data.

A

Ransomware attack

20
Q

________is a code that takes advantage of a software vulnerability.

21
Q

A potential malicious attack that seeks to unlawfully access data, disrupt digital operations or damage information.

22
Q

A pathway or method used by a hacker to illegally access a network or computer.

A

Attack vector

23
Q

An attack, designed to find and take advantage of a computer weakness usually from malicious purposes.

24
Q

A weakness found in a computer system, which has the potential to be accessed in order to compromise the system.

A

Vulnerability

25
Q

What type of attacker mostly uses existing computer code to launch cyber attacks.

A

Script kiddie

26
Q

During a security breach, cyber criminals exposed sensitive corporate data, which component of the
CIA triad, was violated?

A

Confidentiality

27
Q

While downloading an app that appears legitimate, you accidentally install malware that contains a key logger, which element of the CIA Triad, has been compromised?

A

Confidentiality