Lesson 7 Configuring SOHO Network Security Flashcards

1
Q

What are the three properties of secure information?

A
  • Confidentiality: means that certain information should only be known to certain people.
  • Integrity: means that the data is stored and transferred as intended and that any modification is authorized.
  • Availability: means that information is accessible to those authorized to view or modify it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cybersecurity?

A

Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does shoulder surfing in cybersecurity mean?

A

Shoulder surfing is a social engineering tactic to obtain someone’s password or PIN by observing him or her as he or she types it in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does tailgating mean in cybersecurity?

A

Tailgating is a means of entering a secure area without authorization by following closely behind the person who has been allowed to open the door or checkpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does piggybacking mean in cybersecurity?

A

Piggybacking means that the attacker enters a secure area with an employee’s permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spear phishing?

A

Email-based or web-based form of phishing which targets specific individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is whaling?

A

An email-based or web-based form of phishing which targets senior executives or wealthy individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is vishing?

A

Social engineering attack where the threat actor extracts information while speaking over the phone or leveraging IP-based voice messaging services (VoIP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an evil twin attack?

A

Wireless access point that deceives users into believing that it is a legitimate network access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly