Introduction To Cybersecurity Tools And Cyber Attacks Week Two Flashcards

(55 cards)

1
Q

What are the four main types of actors identified in the video ‘A brief overview of types of actors and their motives?’

A

Hackers, Hactivists, Governments, and Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of these common motivations is often attributed to a hacktivists?`

A

Political action and movements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the video ‘Hacking organizations’, which three governments were called out as being active hackers?

A

China, United States, and Israel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which four of the following are known hacking organizations?

A

Anonymous, Guardians of Peace, Syrian Electronic Army, and Fancy Bears

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these hacks resulted in over 100 million credit card numbers being stolen?

A

2015 Target Stores Hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following statements is true?

A

Passive attacks are hard to detect because the original message is delivered unchanged and can pass an integrity check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The purpose of security services includes which three of the following?

A

Enhance security of data processing systems and information transfer

Often replicate functions found in physical documents

Are intended to counter security attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which statement best describes access control?

A

Prevention of unauthorized use of a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The International Telecommunication Union (ITU) X.800 standard addresses which three of the following topics?

A

Access Control, Authentication, and Data Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protocol suppression, ID and authentication are examples of which?

A

Security Mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The motivation for more security in open systems is driven by which three of the following factors?

A

Society’s increasing dependance on computers

The appearance of data protection legislation in several countries

The desire by a number of organizations to use OSI reccommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: The accidental disclosure of confidential data by an employee is considered a legitimate organizational threat.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: The accidental disclosure of confidential information by an employee is considered an attack.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A replay attack and a denial of service attack are examples of what?

A

Security Architecture Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: An application that runs on your computer without your authorization but does no damage to the systems is not considered malware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How would you classify a piece of malicious code designed to cause damage and spreads from one computer to another by attaching itself to files but requires human actions in order to replicate?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How would you classify a piece of malicious code designed collect data about a computer and its users and then report that back to a malicious actor?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A large scale Denial of Service attack usually relies upon which of the following?

A

A botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Antivirus software can be classified as which form of threat control?

A

Technical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following measures can be used to counter a mapping attack?

A

Record traffic entering the network

Look for suspicious activity like IP addresses or ports being scanned sequentially

Use a host scanner and keep an inventory of hosts on your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In order for a network card (NIC) to engage in packet sniffing, it must be running in which mode?

A

Promiscuous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which countermeasure can be helpful in combating an IP Spoofing attack?

A

Ingress filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which two measures can be used to counter a Denial of Service (DOS) attack?

A

Use traceback to identify the source of the flooded packets

Implement a filter to remove flooded packets before they reach the host

24
Q

Which countermeasure should be used again as a host insertion attack?

A

Maintain an accurate inventory of computer hosts by MAC address

Use a host scanning tool to match a list of discovered hosts against known hosts

Investigate newly discovered hosts.

25
Which is not one of the phases of the intrusion kill chain?
Activation
26
Which social engineering attack involves a person instead of a system such as an email server?
Vishing
27
Which of the following is an example of a social enginnering attack?
Calling an employee and telling him you are from IT support and must observe logging into his corporate account.
28
True or False: While many countries are preparing their military for a future cyberwar, there have been no 'cyber battles' to date.
False
29
Which tool did Javier say was crucial to his work as a SOC analyst?
SIEM (Security Information and Event Management)
30
Which hacker organization hacked into the Democratic National Convention and released Hillary Clinton's emails?
Fancy Bears
31
What challenges are expected in the future?
Enhanced espionage from more countries Far more advanced malware New consumer technology to exploit
32
Why are cyber attacks using SWIFT so dangerous?
SWIFT is the protocol used by all banks to transfer money
33
Which statement best describes Authentication?
Assurance that the communicating entity is the one claimed
34
Trusted functionality, security labels, event detection, security audit trails and security recovery are all examples of which type of security mechanism?
Passive security mechanism
35
If an organization responds to an intentional threat, that threat is now classified as what?
An attack
36
An attack that is developed particularly for a specific customer and occurs over a long period of time is a form of what type of attack?
Advanced Persistent Threat
37
Which of these three approaches could be used by hackers as part of a Business Email Compromise attack?
Attorney impersonation CEO Fraud, where CEO sends email to an employee Account compromise
38
Which type of actor was not one of the four types of actors mentioned in the video A brief overview of types of actors and their motives?
Black Hats
39
A political motivation is often attributed to which type of actor?
Hactivist
40
The video Hacking organizations called out several countries with active government sponsored hacking operations in effect. Which one of these was among those named?
Israel
41
Which of these is not a known hacking organization?
The Ponemon Institute
42
Which type of actor hacked the 2016 US Presidential Elections?
Government
43
True or False: Passive attacks are easy to detect because the original messages are usually altered or undelivered.
False
44
True or False: Authentication, Access Control and Data Confidentiality are all addressed by the ITU X.800 standard.
True
45
Trusted functionality, security labels, event detection and security audit trails are all considered which?
Pervasive Security Mechanisms
46
Cryptography, digital signatures, access controls and routing controls considered which?
Specific Security Mechanisms
47
True or False: Only acts performed with intention to do harm can be classified as Organizational Threats
False
48
Traffic flow analysis is classified as which?
A Passive Attack
49
How would you classify a piece of malicious code designed to cause damage, can self-replicate and spreads from one computer to another by attaching itself to files?
Trojan Horse
50
Botnets can be used to orchestrate which form of attack?
Distribution of Spam DDoS attacks Phishing attacks Distribution of Spyware As a Malware launchpad
51
Policies and training can be classified as which form of threat control?
Administrative Controls
52
Which type of attack can be addressed using a switched Ethernet gateway and software on every host on your network that makes sure their NICs is not running in promiscuous mode.
Packet Sniffing
53
A flood of maliciously generated packets swamp a receiver’s network interface preventing it from responding to legitimate traffic. This is characteristic of which form of attack?
A Denial of Service (DOS) Attack
54
A person calls you at work and tells you he is a lawyer for your company and that you need to send him specific confidential company documents right away, or else! Assuming the caller is not really a lawyer for your company but a bad actor, what kind of attack is this?
A Social Engineering Attack
55
True or False: An individual hacks into a military computer and uses it to launch an attack on a target he personally dislikes. This is considered an act of cyberwarfare.
False