Exam Prep Flashcards
What is the notion among hackers that something is worth doing or is interesting?
A) Zero-Day
B) Doxing
C) Hack Value
D)Exploit
C) Hack Value
What is an existence of a weakness,design, or implementation error that may lead to compromising the security of the system?
A) Exploit
B) Payload
C) Vulnerability
D) Bot
C) Vulnerability
What is breach of IT system security through vulnerabilities?
A) Doxing
B) Daisy Chaining
C) Exploit
D) Payload
C) Exploit
What is a part of an exploit code that performs the malicious action? i.e. destroying, creating, backdoor, hijacking computers
A) Vulnerability
B) Bot
C) Hack Value
D) Payload
D) Payload
What is an attack that exploits computer application vulnerabilities before a patch was able to be released?
A) Bot
B) Daisy Chaning
C) Zero-Day Attack
D) Hack Value
C) Zero-Day Attack
What involves gaining access to one network and/or computer to obtain information that will enable them to gain access to multiple other computers and/or networks?
A) Bot
B) Exploit
C) Daisy Chaining
D) Payload
C) Daisy Chaining
What involves publishing personally identifiable information about an individual that was obtain from public databases and social media?
A) Doxing
B) Zero-Day Attack
C) Vulnerability
D) Daisy Chaining
A) Doxing
What is a software application that can be remotely controlled to execute/automate predefined tasks?
A) Bot
B) Payload
C) Hack Value
D) Doxing
A) Bot
What is a state of infrastructure and information well-being to keep the possibility of theft, tampering, disruption of information and services kept tolerable and low?
A) Confidentiality
B) Information Security
C) Authenticity
D) Integrity
B) Information Security
What is the assurance that information is only accessible to authorized individuals?
A) Authenticity
B) Availability
C) Integrity
D)Confidentiality
D) Confidentiality
What is the trustworthiness of preventing improper and unauthorized changes of data or resources?
A) Availability
B) Integrity
C) Information Security
D) Non-Repudiation
B) Integrity
What refers to the assurance that the system which is responsible for the processing, delivering and storing of information is accessible to the authorized users when required?
A) Availability
B) Authenticity
C) Confidentiality
D) Non-Repudiation
A) Availability
What refers to any data, communication or document characteristics which ensures the quality of being genuine?
A) Availability
B) Authenticity
C) Non-Repudiation
D)Confidentiality
B) Authenticity
What guarantees that an individual cannot later deny sending a message and the recipient cannot deny receiving a message?
A) Availability
B) Non-Repudiation
C) Authenticity
D) Confidentiality
B) Non-Repudiation
What three components can any systems level of security be defined by?
A) Authenticity, Confidentiality, Integrity
B) Security, Functionality, Usability
C) Non-Repudiation, Usability, Authenticity
D) Authenticity, Integrity, Security
B) Security, Functionality, Usability
What three components make up attacks?
A) Attacks = Motive (goal) + Method + Vulnerability
B) Attacks = Security + Method + Confidentiality
C) Attacks = Availability + Vulnerability + Motive
D) Attacks = Security + Integrity + Method
A) Attacks = Motive (goal) + Method + Vulnerability
What originates out of the awareness that a target system processes or stores valuable data, which may lead towards an attack on the system?
A) Method
B) Vulnerability
C) Attackers
D) Motive
D) Motive
Who utilizes a variety of different tools and attack techniques to exploit vulnerabilities within a computer system to accomplish their motives?
A) System Analysts
B) Attackers
C) White Hat
D) All of the above
B) Attackers
What is an on-demand delivery of IT capabilities where an organizations sensitive data and clients are stored?
A) Cloud Computing
B) Botnet
C) Workstation
D) Access Control
A) Cloud Computing
What attack vector is a flaw in within a client’s application cloud which can enable attackers to access other client’s data?
A) Mobile Threats
B) Ransomware
C) Advanced Persistent Threats
D) Cloud Computing Threats
D) Cloud Computing Threats
What attack vector focuses on stealing data from a victims machine without their knowledge?
A) Advanced Persistent Threats (APT)
B) Ransomware
C) Mobile Threats
D) Cloud Computing Threats
A) Advanced Persistent Threats (APT)
What is the most prevalent networking threat that is capable of infecting an entire network within seconds?
A) Mobile Threats
B) Viruses and Worms
C) Advanced Persistent Threats
D) Cloud Computing Threats
B) Viruses and Worms
What attack restricts access to files and folders within a computer system and demands an online payment to remove the restrictions?
A) Advanced Persistent Threats (APT)
B) Ransomware
C) Mobile Threats
D) Cloud Computing Threats
B) Ransomware
Why have the focus of attackers shifted towards mobile devices?
A) The increase of mobile device adoption for business and personal purposes, and it also has less security controls.
B) No security controls
C) Individuals do not use mobile devices often
D) All of the above
A) The increase of mobile device adoption for business and personal purposes, and it also has less security controls.