IT0201 FORMATIVE 1 REVIEWER Flashcards
To gain knowledge
What is the best method to prevent Bluetooth from being exploited?
Always disable Bluetooth when it is not being used
What is the purpose of a rootkit?
To gain privileged access to a while concealing itself.
What was the primary objective of the Stuxnet malware?
Physical damage to computer-controlled equipment
Can you identify why each of the following organizations might be interested in your online identity?
Internet service providers
Advertisers
Social media platforms
Websites
Internet service providers - They may be legally required to share your online information with government surveillance agencies or authorities.
Advertisers - To monitor your onlilne activities and send targeted ads your way.
Social media platforms - To gather information based on your online activity, which is then shared with or sold to advertisers for a profit.
Websites - To track your activities using cookies in order to provide a more personalized experience.
How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?
Connect with a VPN Service
Today, there are single security appliances that will solve all the network security needs of an organization.
True or False
FALSE
What name is given to a device that controls or filters traffic going in or out of the network?
Firewall
What is the only way of ensuring that deleted files on your computer are irrecoverable?
Physically destroying your computer’s hard drive.
What is a security playbook?
A collection of repeatable queries or reports that outline a standardized process for incident detection and response.
How can you ensure information remains confidential?
Using username/password authentication, Setting file access permissions and Encrypting sensitive data.
What type of attack overwhelms a computer’s resources, crippling it through excessive memory usage or CPU strain?
algorithm
What does IoE stand for?
Internet of Everthing
What is the definition of vulnerability?
A susceptibility or flaw that exposes a target to potential exploitation or attack.
What is an example of a Internet data domain?
What type of attack overwhelms a target’s resources using multiply systems, rendering it inaccessible?
Distributed Denial-of-Service (DDoS)
Which three types of sensitive records are most attractive to cyber criminals?
Medical, Employment and Education
What term describes a inexperienced or novice hacker?
Script Kiddie
What Workforce Framework category involves analyzing and assessing cybersecurity data to determine its intelligence value?
Analyze
What does BYOD stand for?
Bring your own device
Which two methods help prevent cyber criminal activities?
Implement proactive alert systems and Exchanging cyber threat data
Does having no social media and only browsing the Internet mean no online identity exists?
No
Which of the following should be carried out to address known software vulnerabilities of a specific application?
Install a security patch
Which of the following tools can be perform real-time traffic and port analysis and can also detect port scans, fingerprinting and buffer overflow attacks?
Snort
Which of the following is an example of two factor authentication?
Your fingerprint and your password