Kahoots Flashcards

1
Q

What involves psychological manipulation of people to divulge information or perform actions that benefit attackers?

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: A targeted social engineering attack on a specific user for his/her specific likes is known as an insider attack.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: Cybersecurity in the supply chain can be viewed as an information technology problem only.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensuring a third party is ___________ data is an important prerequisite when considering cloud computing.

A

Securing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A third party contractor gaining _______ unauthorized access to information systems is considered an insider threat.

A

Physical or Virtual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What malware has the defining factor of being able to replicate itself without user interaction?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malicious code is a category including _________ and website scripts that can be uploaded into a vulnerable system.

A

Malicious Software (malware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two common pathways from criminals to users?

A

Email and World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where does a “boot-sector virus” reside?

A

First sector of a disk or Universal Serial Bus (USB) drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File infector viruses will infect what type of files?

A

Executable Files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A worm has the unique characteristic of being able to replicate without needing _________ to activate the virus.

A

a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Per the STRIDE model, what threat involves claiming you didn’t do something or were not responsible for an action?

A

Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Per the STRIDE model, what term is described by exhausting resources needed to provide service?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the destructive behavior where the attacker changes entries in records.

A

Data diddling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the ways to characterize an attack?

A

intent, point of initiation, and method of delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which network attack is difficult to address because it sends more requests to one machine than it can handle?

A

Distributed Denial of Service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When Network Access Control connects to a network, what can it scan for on the system?

A

Virus definitions, antivirus software, and operating systems updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Agentless Network Access Control does not require a/an agent _________ to be installed on a client.

A

software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: Dissolvable agents run the NAC check for a current status of the system and remain installed on the system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of authentication factor requires a biometrics system?

A

something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of authentication factor is based on user habits like typing patterns?

A

something you do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False: Combining username & password is considered multi-factor authentication.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why are Universal Serial Bus (USB) devices particularly dangerous to computer systems and networks?

A

Worms can activate and spread just by plugging one in to a computer, they are easy to conceal, they hold large amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a cryptographic processor stored on a separate card and installed on a system as an add-on device?

A

Hardware Security Module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

To prevent data theft and worms, USB data ports are _________ on Department of Defense computers.

A

disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When Bitlocker is enabled, Windows 7 and newer versions can’t boot without a key. What type of encryption is this?

A

full disk encryption (FDE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When using Full Disk Encryption (FDE), what stores the cryptographic keys within the system?

A

Trusted Platform Module (TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Storage Drive encryption can encrypt what kinds of storage drives?

A

Hard drives and Universal Serial Bus (USB) drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is NOT an authentication factor?

A

Someone you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What service has this drawback: if an account is compromised, a hacker can access multiple servers rather than one?

A

Single-Sign-On (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What must be supplied by a user who’s attempting to connect to a network secured with 802.1X?

A

Valid Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Any network resources the user consumes during their session is logged. What is this process called?

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What’s defined as presenting information about yourself to a system?

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What protocol does DIAMETER use to send and secure data during transmission?

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What AAA protocol gives less reliable/secure service through User Datagram Protocol (UDP)?

A

Remote Authentication Dial-In User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The code is checked for functionality in what stage of the SDLC?

A

Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which software development life cycle requires completion of each development phase before moving to the next phase?

A

Waterfall

38
Q

During the Agile SDLC process, when can developers backtrack or repeat steps?

A

Anytime

39
Q

In what attack is malicious code injected into a web application via a script?

A

Cross Site Scripting (XSS)

40
Q

Websites store cookies containing user preferences and _________ information.

A

logon

41
Q

What risk is posed by enabling the “Remember Me” feature with internet browsers?

A

cross-site forgery

42
Q

What provides web filtering?

A

Proxy server

43
Q

Network administrators implement permissions on files and folders to build what?

A

Access Control List (ACL)

44
Q

Which NTFS permission gives a user all permission possible?

A

Full Control

45
Q

Group policy can be centrally configured for the network through _____________.

A

Active Directory

46
Q

When creating a firewall plan, you will typically create all of the following zones EXCEPT what?

A

communal zone

47
Q

What should be placed in a private zone?

A

Local Area Network (LAN)

48
Q

What security zone contains the internet?

A

public zone

49
Q

In what security zone would you put a limited-access server?

A

extranet zone

50
Q

In what security zone would you put a Wi-Fi network?

A

wireless zone

51
Q

By having secure network user habits, the cyber _________ of the network is ensured.

A

hygiene

52
Q

True or False: To ensure antivirus definitions are kept up to date, users should allow their software to perform automatic updates.

A

True

53
Q

How often should antivirus software be set up to automatically perform security scans?

A

Regularly

54
Q

Before you dispose of a computer you should use a wipe utility program to _________ the entire hard drive.

A

overwrite

55
Q

What incident response team role has technical expertise to assess and identify the scale of the security incident?

A

Technical Specialist

56
Q

What document should define each team member’s roles and responsibilities?

A

Incident Response Plan

57
Q

How would the following incident/event be categorized: normal functionality is denied.

A

CAT 4 - Denial of Service

58
Q

How would the following incident/event be categorized: authorized user breaches AF policy.

A

CAT 5 - Non-Compliance Activity

59
Q

How would the following incident/event be categorized: event that is a false alarm.

A

CAT 9 - Explained Anomaly

60
Q

How would the following incident/event be categorized: event undergoing further review.

A

CAT 8 - Investigating

61
Q

A/an _________ is an observable occurance in a system and/or network.

A

event

62
Q

A/an _________ is an assessed occurance in a system and/or network that jeopardizes the information system.

A

incident

63
Q

If a virus is discovered on a system, who should isolate the computer from the network?

A

first responder

64
Q

Cyber Incident Response: What’s the first incident response phase where the AF detects activity with a variety of means and capabilities?

A

Detection & Reporting Events

65
Q

During an incident, what must the incident handling staff do with the data to allow for further incident analysis?

A

preserve integrity of data

66
Q

The goal of a network incident first responder is to _________ the incident.

A

contain

67
Q

What is the starting point for all future configuration assessments?

A

Baseline

68
Q

True or False: Baselining will require updating to make it current with a desired configuration.

A

True

69
Q

When creating a baseline, what metric will change the perspective of your data?

A

time span and starting point

70
Q

It’s necessary to maintain a/an _________ to revert the system after changes if needed.

A

baseline

71
Q

Which backup method backs up files that were altered since the last backup and clears the archive flag after?

A

Incremental Backup

72
Q

Disaster Recovery Plan: In which step would you form a team to assist in the entire disaster recovery operation?

A

Assemble a Disaster Recovery Team

73
Q

In which step would you gather and document equipment, policies, telephone numbers, and other valuable documents?

A

data collection

74
Q

When should gathering information take place during root cause analysis?

A

first step

75
Q

Root Cause Analysis: During which phase should personnel continuously review the incident to ensure accuracy?

A

Validate the Incident

76
Q

What part of post-incident analysis captures lessons learned, initial root cause, and other problems?

A

postmortem

77
Q

Name the all-source report that focuses on individuals, groups, or organizations ID’d as threats to DoD networks.

A

Network Intelligence Report (NIR)

78
Q

All involved personnel should ID and ______ all relevant information about a network incident for future analysis.

A

collect

79
Q

What document identifies potential foreign threats to Department of Defense networks?

A

Network Intelligence Report (NIR)

80
Q

Having the goals of Confidentiality, Integrity, and Availability best describes which security program?

A

COMPUSEC (Computer Security)

81
Q

TEMPEST is a security program that identifies compromising _________ in information systems

A

emanations

82
Q

What level of classification, if disclosed, could cause exceptionally grave damage to national security?

A

Top Secret (TS)

83
Q

OPSEC reduces mission vulnerabilities by eliminating or reducing adversary collection of _______.

A

critical information

84
Q

Cryptography is the use of coding systems to _________ information.

A

encrypt & decrypt

85
Q

TRANSEC results from all measures designed to protect intentional transmissions by means other than what?

A

crypto analysis

86
Q

What security program focuses on end-point security, ports, protocols, and service management within the Air Force?

A

COMPUSEC

87
Q

_________ vulnerabilities come from unintentionally emitted signals or compromising emanations.

A

TEMPEST

88
Q

Which of the following would be considered the LEAST classified compared to the others?

A

Confidential (C)

89
Q

Which security program is a continuous process and an inherent part of military culture?

A

OPSEC

90
Q

We aim to defeat our enemy’s crypto analysis efforts with our _________ systems.

A

cryptographic

91
Q

_______ is applying cryptosecurity techniques to each situation so our intercepted signals will be unintelligible.

A

TRANSEC