Introduction To Cybersecurity Tools And Cyber Attacks Week Two Flashcards
What are the four main types of actors identified in the video ‘A brief overview of types of actors and their motives?’
Hackers, Hactivists, Governments, and Internal
Which of these common motivations is often attributed to a hacktivists?`
Political action and movements
In the video ‘Hacking organizations’, which three governments were called out as being active hackers?
China, United States, and Israel
Which four of the following are known hacking organizations?
Anonymous, Guardians of Peace, Syrian Electronic Army, and Fancy Bears
Which of these hacks resulted in over 100 million credit card numbers being stolen?
2015 Target Stores Hack
Which of the following statements is true?
Passive attacks are hard to detect because the original message is delivered unchanged and can pass an integrity check
The purpose of security services includes which three of the following?
Enhance security of data processing systems and information transfer
Often replicate functions found in physical documents
Are intended to counter security attacks
Which statement best describes access control?
Prevention of unauthorized use of a resource
The International Telecommunication Union (ITU) X.800 standard addresses which three of the following topics?
Access Control, Authentication, and Data Confidentiality
Protocol suppression, ID and authentication are examples of which?
Security Mechanism
The motivation for more security in open systems is driven by which three of the following factors?
Society’s increasing dependance on computers
The appearance of data protection legislation in several countries
The desire by a number of organizations to use OSI reccommendations
True or False: The accidental disclosure of confidential data by an employee is considered a legitimate organizational threat.
True
True or False: The accidental disclosure of confidential information by an employee is considered an attack.
False
A replay attack and a denial of service attack are examples of what?
Security Architecture Attack
True or False: An application that runs on your computer without your authorization but does no damage to the systems is not considered malware.
False
How would you classify a piece of malicious code designed to cause damage and spreads from one computer to another by attaching itself to files but requires human actions in order to replicate?
Virus
How would you classify a piece of malicious code designed collect data about a computer and its users and then report that back to a malicious actor?
Spyware
A large scale Denial of Service attack usually relies upon which of the following?
A botnet
Antivirus software can be classified as which form of threat control?
Technical Controls
Which of the following measures can be used to counter a mapping attack?
Record traffic entering the network
Look for suspicious activity like IP addresses or ports being scanned sequentially
Use a host scanner and keep an inventory of hosts on your network
In order for a network card (NIC) to engage in packet sniffing, it must be running in which mode?
Promiscuous
Which countermeasure can be helpful in combating an IP Spoofing attack?
Ingress filtering