Introduction To Cybersecurity Tools And Cyber Attacks Week Two Flashcards

1
Q

What are the four main types of actors identified in the video ‘A brief overview of types of actors and their motives?’

A

Hackers, Hactivists, Governments, and Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of these common motivations is often attributed to a hacktivists?`

A

Political action and movements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the video ‘Hacking organizations’, which three governments were called out as being active hackers?

A

China, United States, and Israel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which four of the following are known hacking organizations?

A

Anonymous, Guardians of Peace, Syrian Electronic Army, and Fancy Bears

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these hacks resulted in over 100 million credit card numbers being stolen?

A

2015 Target Stores Hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following statements is true?

A

Passive attacks are hard to detect because the original message is delivered unchanged and can pass an integrity check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The purpose of security services includes which three of the following?

A

Enhance security of data processing systems and information transfer

Often replicate functions found in physical documents

Are intended to counter security attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which statement best describes access control?

A

Prevention of unauthorized use of a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The International Telecommunication Union (ITU) X.800 standard addresses which three of the following topics?

A

Access Control, Authentication, and Data Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protocol suppression, ID and authentication are examples of which?

A

Security Mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The motivation for more security in open systems is driven by which three of the following factors?

A

Society’s increasing dependance on computers

The appearance of data protection legislation in several countries

The desire by a number of organizations to use OSI reccommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: The accidental disclosure of confidential data by an employee is considered a legitimate organizational threat.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: The accidental disclosure of confidential information by an employee is considered an attack.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A replay attack and a denial of service attack are examples of what?

A

Security Architecture Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: An application that runs on your computer without your authorization but does no damage to the systems is not considered malware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How would you classify a piece of malicious code designed to cause damage and spreads from one computer to another by attaching itself to files but requires human actions in order to replicate?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How would you classify a piece of malicious code designed collect data about a computer and its users and then report that back to a malicious actor?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A large scale Denial of Service attack usually relies upon which of the following?

A

A botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Antivirus software can be classified as which form of threat control?

A

Technical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following measures can be used to counter a mapping attack?

A

Record traffic entering the network

Look for suspicious activity like IP addresses or ports being scanned sequentially

Use a host scanner and keep an inventory of hosts on your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In order for a network card (NIC) to engage in packet sniffing, it must be running in which mode?

A

Promiscuous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which countermeasure can be helpful in combating an IP Spoofing attack?

A

Ingress filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which two measures can be used to counter a Denial of Service (DOS) attack?

A

Use traceback to identify the source of the flooded packets

Implement a filter to remove flooded packets before they reach the host

24
Q

Which countermeasure should be used again as a host insertion attack?

A

Maintain an accurate inventory of computer hosts by MAC address

Use a host scanning tool to match a list of discovered hosts against known hosts

Investigate newly discovered hosts.

25
Q

Which is not one of the phases of the intrusion kill chain?

A

Activation

26
Q

Which social engineering attack involves a person instead of a system such as an email server?

A

Vishing

27
Q

Which of the following is an example of a social enginnering attack?

A

Calling an employee and telling him you are from IT support and must observe logging into his corporate account.

28
Q

True or False: While many countries are preparing their military for a future cyberwar, there have been no ‘cyber battles’ to date.

A

False

29
Q

Which tool did Javier say was crucial to his work as a SOC analyst?

A

SIEM (Security Information and Event Management)

30
Q

Which hacker organization hacked into the Democratic National Convention and released Hillary Clinton’s emails?

A

Fancy Bears

31
Q

What challenges are expected in the future?

A

Enhanced espionage from more countries

Far more advanced malware

New consumer technology to exploit

32
Q

Why are cyber attacks using SWIFT so dangerous?

A

SWIFT is the protocol used by all banks to transfer money

33
Q

Which statement best describes Authentication?

A

Assurance that the communicating entity is the one claimed

34
Q

Trusted functionality, security labels, event detection, security audit trails and security recovery are all examples of which type of security mechanism?

A

Passive security mechanism

35
Q

If an organization responds to an intentional threat, that threat is now classified as what?

A

An attack

36
Q

An attack that is developed particularly for a specific customer and occurs over a long period of time is a form of what type of attack?

A

Advanced Persistent Threat

37
Q

Which of these three approaches could be used by hackers as part of a Business Email Compromise attack?

A

Attorney impersonation

CEO Fraud, where CEO sends email to an employee

Account compromise

38
Q

Which type of actor was not one of the four types of actors mentioned in the video A brief overview of types of actors and their motives?

A

Black Hats

39
Q

A political motivation is often attributed to which type of actor?

A

Hactivist

40
Q

The video Hacking organizations called out several countries with active government sponsored hacking operations in effect. Which one of these was among those named?

A

Israel

41
Q

Which of these is not a known hacking organization?

A

The Ponemon Institute

42
Q

Which type of actor hacked the 2016 US Presidential Elections?

A

Government

43
Q

True or False: Passive attacks are easy to detect because the original messages are usually altered or undelivered.

A

False

44
Q

True or False: Authentication, Access Control and Data Confidentiality are all addressed by the ITU X.800 standard.

A

True

45
Q

Trusted functionality, security labels, event detection and security audit trails are all considered which?

A

Pervasive Security Mechanisms

46
Q

Cryptography, digital signatures, access controls and routing controls considered which?

A

Specific Security Mechanisms

47
Q

True or False: Only acts performed with intention to do harm can be classified as Organizational Threats

A

False

48
Q

Traffic flow analysis is classified as which?

A

A Passive Attack

49
Q

How would you classify a piece of malicious code designed to cause damage, can self-replicate and spreads from one computer to another by attaching itself to files?

A

Trojan Horse

50
Q

Botnets can be used to orchestrate which form of attack?

A

Distribution of Spam

DDoS attacks

Phishing attacks

Distribution of Spyware

As a Malware launchpad

51
Q

Policies and training can be classified as which form of threat control?

A

Administrative Controls

52
Q

Which type of attack can be addressed using a switched Ethernet gateway and software on every host on your network that makes sure their NICs is not running in promiscuous mode.

A

Packet Sniffing

53
Q

A flood of maliciously generated packets swamp a receiver’s network interface preventing it from responding to legitimate traffic. This is characteristic of which form of attack?

A

A Denial of Service (DOS) Attack

54
Q

A person calls you at work and tells you he is a lawyer for your company and that you need to send him specific confidential company documents right away, or else! Assuming the caller is not really a lawyer for your company but a bad actor, what kind of attack is this?

A

A Social Engineering Attack

55
Q

True or False: An individual hacks into a military computer and uses it to launch an attack on a target he personally dislikes. This is considered an act of cyberwarfare.

A

False