module 15 security consideration Flashcards
What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
data loss or manipulation
What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?
identity theft
What kind of threat is described when a threat actor prevents legal users from accessing data services?
Disruption of service
What kind of threat is described when a threat actor steals scientific research data?
Information theft
What kind of threat is described when a threat actor overloads a network to deny other users network access?
disruption of service
What kind of threat is described when a threat actor alters data records?
data loss or manipulation
What kind of threat is described when a threat actor is stealing the user database of a company?
information theft
What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?
identity theft
Eliseo opened an email sent to him by his brother, Lomiel. A few hours later, Eliseo received several phone calls from friends saying that they received emails from him that he did not knowingly send.
Worm
Noah downloaded a file from the internet. Shortly after he opened the file, his hard drive crashed, and he lost all information on his computer.
Virus
Safa was surfing the internet when a program appeared claiming that she had won a prize. When she clicked to see what prize she had won, a program was installed on her computer unknowingly to her. The program that was installed allowed an intruder access to her hard drive and personal information.
Trojan Horse
True or false? Spyware is a program that gathers personal information from your computer without your permission or knowledge.
True
True or false? A botnet is an individual infected computer that can be controlled by a command and control server.
False
Which of the following describes a DoS attack? (Choose two.)
1- The attack is relatively simple to conduct, even by an unskilled threat actor
2- A network, host, application is sent an enormous quantity of data at a rate which it cannot handle
Which of the following describes a DDoS attack? (Choose three.)
1- The attack originate from multiple, coordinated source
2- Zombies are controlled by a command and control server
3- A threat actor builds a network of infected host called a botnet
Which of the following is installed to prevent unwanted advertisements from displaying on your computer?
Popup blocker
Which of the following controls traffic to and from your network?
Firewall
Which of the following is installed on an end-user workstation or server to detect and remove malware from files and email?
virus protection