Introduction to Cybersecurity Tools and Cyber Attacks Week Three Flashcards

1
Q

Encrypting your email is an example of addressing which aspect of the CIA Triad?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You fail to backup your files and then drop your laptop breaking it into many small pieces. You have just failed to address which aspect of the CIA Triad?

A

Avaliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The use of digital signatures is an example of which concept?

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trudy forwards a message from Alice to Bob, but changes the timestamp on Alice’s message before sending it to make it look like it came in later. This is a violation of which aspect of the CIA Triad?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Managers in the Singapore office at your company can access documents that managers in other offices cannot access, nor can non-manager employees in the Singapore office. Which two access criteria types were likely involved in setting this up?

A

Physical Location and Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In incident management, an event that has a negative impact on some aspect of the network or data is called what?

A

Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In incident management, a data inventory, data classification and data management process are part of which key concept?

A

E-Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which phase of the Incident Response Process do steps like Identify cyber security incident, Define objectives and investigate situation and Take appropriate action fall into?

A

Phase 2: Respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the context of security standards and compliance, which two of these items are goals of frameworks and best practices?

A

They help translate the business needs into technical or operational needs

They seek to improve performance, controls, and metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company document that says employees may not do online shopping while at work would be which of the following?

A

Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which three of these are compliance standards that must be adhered to by companies is some industries / countries?

A

SOX, PCI/DSS, and HIPPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A method of evaluating computer and network security by simulating an attack on a computer system or network from external or internal threats is know as which of the following?

A

A pentest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The OWASP “Top 10” provides guidance on what?

A

The top 10 application vulnerabilities reported each year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two key components are part of incident response?

A

Response Team and Investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which is not part of the Sans Institutes Audit process?

A

Help to translate the business needs into technical or operational needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which key concept to understand incident response is defined as “data inventory, helps to understand the current tech status, data classification, data management, we could use automated systems. Understand how you control data retention and backup.”

A

E-Discovery

17
Q

Which is not included as part of the IT Governance process?

A

Audits

18
Q

Trudy reading Alice’s message to Bob is a violation of which aspect of the CIA Triad?

A

Confidentiality

19
Q

A hash is a mathematical algorithm that helps assure which aspect of the CIA Triad?

A

Integrity

20
Q

A successful DOS attack against your company’s servers is a violation of which aspect of the CIA Triad?

A

Avaliability

21
Q

Which of these is an example of the concept of non-repudiation?

A

Alice sends a message to Bob and Bob knows for a certainty that it came from Alice and no one else.

22
Q

You have been asked to establish access to corporate documents in such a way that they can be read from anywhere, but only modified while the employees are in the office. Which 2 access criteria types were likely involved in setting this up?

A

Physical location and Transaction type

23
Q

In incident management, an observed change to the normal behavior of a system, environment or process is called what?

A

Event

24
Q

In incident management, tools like SIEM, SOA and UBA are part of which key concept?

A

Automated System

25
Q

Which phase of the Incident Response Process do steps like Carry out a post incident review and Communicate and build on lessons learned fall into?

A

Follow Up

26
Q

In the context of security standards and compliance, which two of these are considered normative and compliance items?

A

They serve as an enforcement mechanism for government, industry or clients.

They are rules to follow for a specific industry.

27
Q

A company document that details how an employee should request Internet access for her computer would be which of the following?

A

Procedure

28
Q

Which of these is a methodology by which to conduct audits?

A

OCTAVE

29
Q

Mile 2 CPTE Training teaches you how to do what?

A

Conduct a pentest

30
Q
A