Kahoots Flashcards
What involves psychological manipulation of people to divulge information or perform actions that benefit attackers?
Social Engineering
True or False: A targeted social engineering attack on a specific user for his/her specific likes is known as an insider attack.
False
True or False: Cybersecurity in the supply chain can be viewed as an information technology problem only.
False
Ensuring a third party is ___________ data is an important prerequisite when considering cloud computing.
Securing
A third party contractor gaining _______ unauthorized access to information systems is considered an insider threat.
Physical or Virtual
What malware has the defining factor of being able to replicate itself without user interaction?
Worm
Malicious code is a category including _________ and website scripts that can be uploaded into a vulnerable system.
Malicious Software (malware)
What are the two common pathways from criminals to users?
Email and World Wide Web
Where does a “boot-sector virus” reside?
First sector of a disk or Universal Serial Bus (USB) drive
File infector viruses will infect what type of files?
Executable Files
A worm has the unique characteristic of being able to replicate without needing _________ to activate the virus.
a user
Per the STRIDE model, what threat involves claiming you didn’t do something or were not responsible for an action?
Repudiation
Per the STRIDE model, what term is described by exhausting resources needed to provide service?
Denial of Service
Name the destructive behavior where the attacker changes entries in records.
Data diddling
What are the ways to characterize an attack?
intent, point of initiation, and method of delivery
Which network attack is difficult to address because it sends more requests to one machine than it can handle?
Distributed Denial of Service (DDoS)
When Network Access Control connects to a network, what can it scan for on the system?
Virus definitions, antivirus software, and operating systems updates
Agentless Network Access Control does not require a/an agent _________ to be installed on a client.
software
True or False: Dissolvable agents run the NAC check for a current status of the system and remain installed on the system.
False
What type of authentication factor requires a biometrics system?
something you are
What type of authentication factor is based on user habits like typing patterns?
something you do
True or False: Combining username & password is considered multi-factor authentication.
False
Why are Universal Serial Bus (USB) devices particularly dangerous to computer systems and networks?
Worms can activate and spread just by plugging one in to a computer, they are easy to conceal, they hold large amounts of data
What is a cryptographic processor stored on a separate card and installed on a system as an add-on device?
Hardware Security Module (HSM)
To prevent data theft and worms, USB data ports are _________ on Department of Defense computers.
disabled
When Bitlocker is enabled, Windows 7 and newer versions can’t boot without a key. What type of encryption is this?
full disk encryption (FDE)
When using Full Disk Encryption (FDE), what stores the cryptographic keys within the system?
Trusted Platform Module (TPM)
Storage Drive encryption can encrypt what kinds of storage drives?
Hard drives and Universal Serial Bus (USB) drive
Which of the following is NOT an authentication factor?
Someone you know
What service has this drawback: if an account is compromised, a hacker can access multiple servers rather than one?
Single-Sign-On (SSO)
What must be supplied by a user who’s attempting to connect to a network secured with 802.1X?
Valid Credentials
Any network resources the user consumes during their session is logged. What is this process called?
Accounting
What’s defined as presenting information about yourself to a system?
Identification
What protocol does DIAMETER use to send and secure data during transmission?
Transmission Control Protocol (TCP)
What AAA protocol gives less reliable/secure service through User Datagram Protocol (UDP)?
Remote Authentication Dial-In User Service (RADIUS)
The code is checked for functionality in what stage of the SDLC?
Testing