Module 1 - The Danger Flashcards

1
Q

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

A type of virus
A type of logic bomb
A type of ransomware
A type of worm

A

A type of ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cyberwarfare?

It is an attack only on military targets.
It is an attack on a major corporation.
It is an attack that only involves robots and bots.
It is an attack designed to disrupt, corrupt, or exploit national interests.

A

It is an attack designed to disrupt, corrupt, or exploit national interests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can a security information and event management system in an SOC be used to help personnel fight against security threats?

By collecting and filtering data
By filtering network traffic
By authenticating users to network resources
By encrypting communications to remote sites

A

By collecting and filtering data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which three technologies should be included in an SOC security information and event management system? (Choose three.)

Proxy service
User authentication
Threat intelligence
Security monitoring
Intrusion prevention
Event collection, correlation, and analysis

A

Security monitoring
Event collection, correlation, and analysis
Threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What name is given to hackers who hack for a political or social cause?

White hat
Hacker
Hacktivist
Blue hat

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which organization is an international nonprofit organization that offers the CISSP certification?

(ISC)2
IEEE
GIAC
CompTIA

A

(ISC)2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

After a security incident is verified in a SOC, an incident responder reviewsthe incident but cannot identify the source of the incident and form an effective mitigation procedure. To whom should the incident ticket be escalated?

A cyberoperations analyst for help
An SME for further investigation
An alert analyst for further analysis
The SOC manager to ask for other personnel to be assigned

A

An SME for further investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The term Alert Analyst refers to which group of personnel in an SOC?

Tier 1 personnel
Tier 2 personnel
Tier 3 personnel
SOC managers

A

Tier 1 personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a rogue wireless hotspot?

  • It is a hotspot that was set up with outdated devices.
  • It is a hotspot that does not encrypt network user traffic.
  • It is a hotspot that does not implement strong user authentication mechanisms.
  • It is a hotspot that appears to be from a legitimate business but was actually set up by someone without the permission from the business.
A

It is a hotspot that appears to be from a legitimate business but was actually set up by someone without the permission from the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a potential risk when using a free and open wireless hotspot in a public location?

Too many users trying to connect to the Internet may cause a network traffic jam.
The Internet connection can become too slow when many users access the wireless hotspot.
Network traffic might be hijacked and information stolen.
Purchase of products from vendors might be required in exchange for the Internet access.

A

Network traffic might be hijacked and information stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats?

by integrating all security devices and appliances in an organization
by analyzing logging data in real time
by combining data from multiple technologies
by dynamically implementing firewall rules

A

by combining data from multiple technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which statement best describes a motivation of hacktivists?

They are part of a protest group behind a political cause.
They are curious and learning hacking skills.
They are trying to show off their hacking skills.
They are interested in discovering new exploits.

A

They are part of a protest group behind a political cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If a SOC has a goal of 99.999% uptime, how many minutes of downtime a year would be considered within its goal?

Approximately 5 minutes per year.
Approximately 10 minutes per year.
Approximately 20 minutes per year.
Approximately 30 minutes per year.

A

Approximately 5 minutes per year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a SOC has a goal of 99% uptime, how many minutes of downtime a year would be considered within its goal?

Approximately 15 minutes per year.
Approximately 20 minutes per year.
Approximately 40 minutes per year.
Approximately 55 minutes per year.

A

Approximately 15 minutes per year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why do IoT devices pose a greater risk than other computing devices on a network?

Most IoT devices do not require an Internet connection and are unable to receive new updates.
IoT devices cannot function on an isolated network with only an Internet connection.
Most IoT devices do not receive frequent firmware updates.
IoT devices require unencrypted wireless connections.

A

Most IoT devices do not receive frequent firmware updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two services are provided by security operations centers? (Choose two.)

managing comprehensive threat solutions
ensuring secure routing packet exchanges
responding to data center physical break-ins
monitoring network security threats
providing secure Internet connections

A

Which two services are provided by security operations centers? (Choose two.)

managing comprehensive threat solutions
monitoring network security threats

17
Q

Which organization offers the vendor-neutral CySA+ certification?

IEEE
CompTIA
(ISC)²
GIAC

A

CompTIA

18
Q

What was used as a cyberwarfare weapon to attack a uranium enrichment facility in Iran?

DDoS
SQL injection
PSYOPS
Stuxnet

A

Stuxnet

19
Q

Which personnel in a SOC is assigned the task of verifying whether an alert triggered by monitoring software represents a true security incident?

SOC Manager
Tier 2 personnel
Tier 3 personnel
Tier 1 personnel

A

Tier 1 personnel

20
Q

Which three technologies should be included in a SOC security information and event management system? (Choose three.)

firewall appliance
security monitoring
log management
intrusion prevention
proxy service
threat intelligence

A

log management
security monitoring
threat intelligence

21
Q

Which statement describes cyberwarfare?

Cyberwarfare is an attack carried out by a group of script kiddies.
It is a series of personal protective equipment developed for soldiers involved in nuclear war.
It is simulation software for Air Force pilots that allows them to practice under a simulated war scenario.
It is Internet-based conflict that involves the penetration of information systems of other nations.

A

It is Internet-based conflict that involves the penetration of information systems of other nations.

22
Q

in the operation of a SOC, which system is frequently used to let an analyst select alerts from a pool to investigate?

syslog server
registration system
ticketing system
security alert knowledge-based system

A

ticketing system

23
Q

What name is given to an amateur hacker?

red hat
script kiddie
black hat
blue team

A

script kiddie

24
Q

Which personnel in a SOC are assigned the task of hunting for potential threats and implementing threat detection tools?

Tier 1 Analyst
SOC Manager
Tier 2 Incident Reporter
Tier 3 SME

A

Tier 3 SME

25
Q

Match the job titles to SOC personnel positions. (Not all options are used.)

A