IT0201 FORMATIVE 1 REVIEWER Flashcards

To gain knowledge

1
Q

What is the best method to prevent Bluetooth from being exploited?

A

Always disable Bluetooth when it is not being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of a rootkit?

A

To gain privileged access to a while concealing itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What was the primary objective of the Stuxnet malware?

A

Physical damage to computer-controlled equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can you identify why each of the following organizations might be interested in your online identity?

Internet service providers

Advertisers

Social media platforms

Websites

A

Internet service providers - They may be legally required to share your online information with government surveillance agencies or authorities.

Advertisers - To monitor your onlilne activities and send targeted ads your way.

Social media platforms - To gather information based on your online activity, which is then shared with or sold to advertisers for a profit.

Websites - To track your activities using cookies in order to provide a more personalized experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?

A

Connect with a VPN Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Today, there are single security appliances that will solve all the network security needs of an organization.
True or False

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What name is given to a device that controls or filters traffic going in or out of the network?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the only way of ensuring that deleted files on your computer are irrecoverable?

A

Physically destroying your computer’s hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a security playbook?

A

A collection of repeatable queries or reports that outline a standardized process for incident detection and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you ensure information remains confidential?

A

Using username/password authentication, Setting file access permissions and Encrypting sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of attack overwhelms a computer’s resources, crippling it through excessive memory usage or CPU strain?

A

algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does IoE stand for?

A

Internet of Everthing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the definition of vulnerability?

A

A susceptibility or flaw that exposes a target to potential exploitation or attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an example of a Internet data domain?

A

LinkedIn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of attack overwhelms a target’s resources using multiply systems, rendering it inaccessible?

A

Distributed Denial-of-Service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which three types of sensitive records are most attractive to cyber criminals?

A

Medical, Employment and Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What term describes a inexperienced or novice hacker?

A

Script Kiddie

18
Q

What Workforce Framework category involves analyzing and assessing cybersecurity data to determine its intelligence value?

A

Analyze

19
Q

What does BYOD stand for?

A

Bring your own device

20
Q

Which two methods help prevent cyber criminal activities?

A

Implement proactive alert systems and Exchanging cyber threat data

21
Q

Does having no social media and only browsing the Internet mean no online identity exists?

A

No

22
Q

Which of the following should be carried out to address known software vulnerabilities of a specific application?

A

Install a security patch

23
Q

Which of the following tools can be perform real-time traffic and port analysis and can also detect port scans, fingerprinting and buffer overflow attacks?

A

Snort

24
Q

Which of the following is an example of two factor authentication?

A

Your fingerprint and your password

25
Q

Identify the type of cyber attack based on the descriptions.

Uses cyber attack to make political statements and raise awareness.

Conducts cyber espionage or sabotage on behalf of their government.

Utilizes readily available online toools for cyber attacks

A

Uses cyber attack to make political statements and raise awareness. (Hacktivists)

Conducts cyber espionage or sabotage on behalf of their government.
(State-sponsored attackers)

Utilizes readily available online toools for cyber attacks
(Script Kiddies)

26
Q

An individual’s social media profile is an example of a(n) _______ indentity

A

Digital(online)

27
Q

What is the primary goal of a DoS attack?

A

To prevent the target serever from being able to handle additional requests.

28
Q

individuals who engage in unauthorized digital intrusions motivated by ideological or social conviction are colloquially termed

A

Hacktivists

29
Q

What motives a white-hat attacker?

A

Improving cybersecurity

30
Q

Why are internal security threats more damaging?

A

Internal attackers have direct infrastructure access.

31
Q

What type of attacker allows an attacker to use a brute-force approach?

A

Password cracking

32
Q

Why do IoT devices post a great security risk than other computing devices on a network?

A

Most IoT devices do not receive frequent software updates.

33
Q

How can you keep your personal browsing history hidden from other users on a shared computer?

A

Operate the web browser in private mode.

34
Q

What should you do in order to make sure that people you live with do not have access to your secure data?

A

Set up password protection.

35
Q

You are looking to print photos that you have saved on a cloud storage account using a third-party only printing service. After successfully logging into the cloud account, you are automatically given access to the third-party only printing service. What allowed this automatica authentication to occur?

A

The cloud storage Service is an approved applcation for the online printing service.

36
Q

The risk management process consists of four(4) steps. Can you put these in the right order?

Assess the risk
Monitor the risk
Frame the risk
Respond the risk

A

Frame the Risk -> Assess the risk -> Respond to the risk -> Monitor the risk

37
Q

A set of changes done to any program to application with the aim of updating, fixing or improving it is often referred to as what?

A

A patch

38
Q

How data integrity typically verified?

A

Using hashes or checksums

39
Q

Which of the following is a requirement of a strong password?

A

Use special characters such as ! @ or $.

40
Q

What is the correct definition of risk management?

A

The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities.

41
Q

What do you call a program written to take advatange of a known security vulnerability?

A

An exploit.