IT0201 FORMATIVE 1 REVIEWER Flashcards
To gain knowledge
What is the best method to prevent Bluetooth from being exploited?
Always disable Bluetooth when it is not being used
What is the purpose of a rootkit?
To gain privileged access to a while concealing itself.
What was the primary objective of the Stuxnet malware?
Physical damage to computer-controlled equipment
Can you identify why each of the following organizations might be interested in your online identity?
Internet service providers
Advertisers
Social media platforms
Websites
Internet service providers - They may be legally required to share your online information with government surveillance agencies or authorities.
Advertisers - To monitor your onlilne activities and send targeted ads your way.
Social media platforms - To gather information based on your online activity, which is then shared with or sold to advertisers for a profit.
Websites - To track your activities using cookies in order to provide a more personalized experience.
How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?
Connect with a VPN Service
Today, there are single security appliances that will solve all the network security needs of an organization.
True or False
FALSE
What name is given to a device that controls or filters traffic going in or out of the network?
Firewall
What is the only way of ensuring that deleted files on your computer are irrecoverable?
Physically destroying your computer’s hard drive.
What is a security playbook?
A collection of repeatable queries or reports that outline a standardized process for incident detection and response.
How can you ensure information remains confidential?
Using username/password authentication, Setting file access permissions and Encrypting sensitive data.
What type of attack overwhelms a computer’s resources, crippling it through excessive memory usage or CPU strain?
algorithm
What does IoE stand for?
Internet of Everthing
What is the definition of vulnerability?
A susceptibility or flaw that exposes a target to potential exploitation or attack.
What is an example of a Internet data domain?
What type of attack overwhelms a target’s resources using multiply systems, rendering it inaccessible?
Distributed Denial-of-Service (DDoS)
Which three types of sensitive records are most attractive to cyber criminals?
Medical, Employment and Education
What term describes a inexperienced or novice hacker?
Script Kiddie
What Workforce Framework category involves analyzing and assessing cybersecurity data to determine its intelligence value?
Analyze
What does BYOD stand for?
Bring your own device
Which two methods help prevent cyber criminal activities?
Implement proactive alert systems and Exchanging cyber threat data
Does having no social media and only browsing the Internet mean no online identity exists?
No
Which of the following should be carried out to address known software vulnerabilities of a specific application?
Install a security patch
Which of the following tools can be perform real-time traffic and port analysis and can also detect port scans, fingerprinting and buffer overflow attacks?
Snort
Which of the following is an example of two factor authentication?
Your fingerprint and your password
Identify the type of cyber attack based on the descriptions.
Uses cyber attack to make political statements and raise awareness.
Conducts cyber espionage or sabotage on behalf of their government.
Utilizes readily available online toools for cyber attacks
Uses cyber attack to make political statements and raise awareness. (Hacktivists)
Conducts cyber espionage or sabotage on behalf of their government.
(State-sponsored attackers)
Utilizes readily available online toools for cyber attacks
(Script Kiddies)
An individual’s social media profile is an example of a(n) _______ indentity
Digital(online)
What is the primary goal of a DoS attack?
To prevent the target serever from being able to handle additional requests.
individuals who engage in unauthorized digital intrusions motivated by ideological or social conviction are colloquially termed
Hacktivists
What motives a white-hat attacker?
Improving cybersecurity
Why are internal security threats more damaging?
Internal attackers have direct infrastructure access.
What type of attacker allows an attacker to use a brute-force approach?
Password cracking
Why do IoT devices post a great security risk than other computing devices on a network?
Most IoT devices do not receive frequent software updates.
How can you keep your personal browsing history hidden from other users on a shared computer?
Operate the web browser in private mode.
What should you do in order to make sure that people you live with do not have access to your secure data?
Set up password protection.
You are looking to print photos that you have saved on a cloud storage account using a third-party only printing service. After successfully logging into the cloud account, you are automatically given access to the third-party only printing service. What allowed this automatica authentication to occur?
The cloud storage Service is an approved applcation for the online printing service.
The risk management process consists of four(4) steps. Can you put these in the right order?
Assess the risk
Monitor the risk
Frame the risk
Respond the risk
Frame the Risk -> Assess the risk -> Respond to the risk -> Monitor the risk
A set of changes done to any program to application with the aim of updating, fixing or improving it is often referred to as what?
A patch
How data integrity typically verified?
Using hashes or checksums
Which of the following is a requirement of a strong password?
Use special characters such as ! @ or $.
What is the correct definition of risk management?
The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities.
What do you call a program written to take advatange of a known security vulnerability?
An exploit.
Where is cryptocurrency stored?
On the blockchain
Which is the security vulnerability could result in the receipt of malicious information that could force a program to behave in an unintented way?
Non-validated input
What is the common goal of search engine optimization (SEO) poisoning?
To increase web traffic to malicious sites