Information Security Fundamentals Flashcards

1
Q

The assurance that the systems responsible for delivering, storing, and processing information are accessible when required by authorized users is referred to by which of the following elements of information security?

A

Availability: Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify the element of information security that refers to the quality of being genuine or uncorrupted as a characteristic of any communication, documents, or any data.

A

Authenticity: Ensures the identity of an individual is verified by the system or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ruby, a hacker, visited her target company disguised as an aspiring candidate seeking a job. She noticed that certain sensitive documents were thrown in the trash near an employee’s desk. She collected these documents, which included critical information that helped her to perform further attacks. Identify the type of attack performed by Ruby in the above scenario.

A

Close-in Attacks: Close-in attacks are performed when the attacker is in close physical proximity to the target system or network. The main goal of performing this type of attack is to gather or modify the information or disrupt its access. For example, an attacker might shoulder surf user credentials. Attackers gain close proximity through the surreptitious entry, open access, or both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

James, a malware programmer, intruded into a manufacturing plant that produces computer peripheral devices. James tampered with the software inside devices ready to be delivered to clients. The tampered program creates a backdoor that allows unauthorized access to the systems.
Identify the type of attack performed by James in the above scenario to gain unauthorized access to the delivered systems.

A

Distribution attacks: Distribution attacks occur when attackers tamper with hardware or software prior to installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Williams, an employee, was using his personal laptop within the organization’s premises. He connected his laptop to the organization’s internal network and began eavesdropping on the communication between other devices connected to the internal network. He sniffed critical information such as login credentials and other confidential data passing through the network.
Identify the type of attack performed by Williams in the above scenario.

A

Insider attacks: Insider attacks are performed by trusted persons who have physical access to the critical assets of the target. An insider attack involves using privileged access to violate rules or intentionally cause a threat to the organization’s information or information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

David, a professional hacker, has initiated a DDoS attack against a target organization. He developed a malicious code and distributed it through emails to compromise the systems. Then, all the infected systems were grouped together to launch a DDoS attack against the organization.
Identify the type of attack launched by David on the target organization.

A

Botnet: A botnet is a huge network of compromised systems used by hackers to perform a distributed task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Jack is working as a malware analyst in an organization. He was assigned to inspect an attack performed against the organization. Jack determined that the attacker had restricted access to the main computer’s files and folders and was demanding an online payment to remove these restrictions.

A

Ransomware: Restricts access to the computer system’s files and folders and demands an online ransom payment to the malware creator(s) in order to remove the restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following elements of information security ensures that a recipient receives the original message from the sender without any modifications during transit?

A

Integrity: Ensures information is not modified or tampered with by unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following attack vectors involves the use of a huge network of compromised systems by attackers to perform denial-of-service attacks on the target network or systems?

A

Botnet: A botnet is a huge network of compromised systems used by hackers to perform a distributed task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following civilian acts enforces “Electronic Transactions and Code Set Standards”?

A

HIPAA:Transactions are electronic exchanges involving the transfer of information on between two parties for specific purposes. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) designated certain types of organizations as covered entities, including health plans, healthcare clearinghouses, and certain healthcare providers. In the HIPAA regulations, the Secretary of Health and Human Services (HHS) adopted certain standard transactions for the Electronic Data Interchange (EDI) of healthcare data. These transactions are claims and encounter information payment and remittance advice, claim status, eligibility, enrollment and disenrollment, referrals and authorizations, coordination of benefits, and premium payment. Under HIPAA, if a covered entity electronically conducts one of the adopted transactions, they must use the adopted standard— either from ASC, X12N, or NCPDP (for certain pharmacy transactions). Covered entities must adhere to the content and format requirements of each transaction. Every provider who does business electronically must use the same health care transactions, code sets, and identifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly