for 433 class final Flashcards
cram more
Which of the following is NOT part of the “CIA Triad”?
-Confidentiality
-Information
-Integrity
-Availability
Information
Which “Security Control” makes use of firewalls and anti-virus software?
-Physical
-Network
-Operational
-Technical
Technical
Security guards and training programs are an example of what type of control?
-Technical
-Operational
-Managerial
-Physical
Operational
An employee’s contract that sets out disciplinary procedures or causes for dismissal if they do not comply with policies and procedures is an example of what type of control?
-Deterrent
-Directive
-Compensating
-Managerial
Directive
____________ ensures that data is not modified or tampered with.
-Non-repudiation
-Confidentiality
-Persistence
-Integrity
Integrity
A backup system that restores data damaged during an intrusion is an example of what type of control?
-Directive
-Technical
-Corrective
-Deterrent
Corrective
_______________ is the process of identifying security issues and deciding which countermeasures to take in reducing risk to an acceptable level.
-Risk acceptance
-Risk triage
-Risk management
-Risk avoidance
Risk management
Which of the following is a weakness that allows a threat to be carried out?
-Threat
-None of these
-Vulnerability
-Exploit
Vulnerability
____________ provides validation of a message’s origin.
-Non-repudiation
-Confidentiality
-Persistence
-Integrity
Non-repudiation
Which type of control is used after an attack?
-Preventive
-Corrective
-Operational
-Detective
Corrective
Which type of hacker usually seek to exploit security vulnerabilities for some kind of financial reward or revenge.
-Cyber terrorists
-Cyber spies
-Cybercriminals
-Script kiddies
Cybercriminals
Which type of attack uses common internet tools and protocols, making it difficult to distinguish an attack from legitimate traffic.
-Indistinguishable attack
-Common attack
-Sophisticated attack
-Varied behavior attack
Sophisticated attack
Alarms, gateways, locks, lighting, and security cameras are an example of what type of control?
-Technical
-Physical
-Operational
-Managerial
Physical
Which of the following is a procedure or product that takes advantage of a vulnerability to carry out a threat?
-Vulnerability
-Threat
-Exploit
-None of these
Exploit
Which of the following is NOT one of the four (4) broad categories of “Security Controls”?
-Network
-Operational
-Managerial
-Physical
Network
What type of “Threat Actor” typically lacks the skills and sophistication of legitimate hackers.
-Hacktivist
-Gray hat
-Script Kiddies
-White hat
Script Kiddies
Which of the following is an example of “Availability Loss”?
-Phishing
-Identity theft
-Unauthorized file transfers
-Customer access denied
Customer access denied
A ___________ automatically replicates itself without an activation mechanism and can travel across computer networks without any user assistance.
-trojan horse
-worm
-fileless virus
-zombie
worm
A _________ is a set of programs that allows attackers to maintain permanent administrator-level, hidden access to a computer.
-rootkit
-logic bomb
-zombie
-spyware
rootkit
What is the process of manipulating others into providing sensitive information?
-None of these
-Subterfuge
-Reconnaissance
-Social Engineering
Social Engineering
___________ is based on the premise that no single layer is completely effective in securing assets.
-Variety
-Defense in depth
-Randomness
-Principle of least privilege
Defense in depth
According to the lecture, what is a primary objective of an attacker?
-Creating backdoors
-Breaching the system
-Exploiting vulnerabilities
-Escalating privileges
Escalating privileges
A ____________ uses legitimate programs to infect a computer. It leaves no footprint, making it undetectable by most antivirus, whitelisting, and other traditional endpoint security solutions.
-worm
-fileless virus
-zombie
-trojan horse
fileless virus
Which of the following are sources of OSINT?
-All of these are sources of OSINT.
-Media (newspapers, magazines, advertisements)
-Professional and academic publications (journals, academic papers, dissertations)
-Internet (websites, blogs, social media)
All of these are sources of OSINT.