module 15 security consideration Flashcards

1
Q

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

A

data loss or manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kind of threat is described when a threat actor prevents legal users from accessing data services?

A

Disruption of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of threat is described when a threat actor steals scientific research data?

A

Information theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of threat is described when a threat actor overloads a network to deny other users network access?

A

disruption of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What kind of threat is described when a threat actor alters data records?

A

data loss or manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What kind of threat is described when a threat actor is stealing the user database of a company?

A

information theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Eliseo opened an email sent to him by his brother, Lomiel. A few hours later, Eliseo received several phone calls from friends saying that they received emails from him that he did not knowingly send.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Noah downloaded a file from the internet. Shortly after he opened the file, his hard drive crashed, and he lost all information on his computer.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Safa was surfing the internet when a program appeared claiming that she had won a prize. When she clicked to see what prize she had won, a program was installed on her computer unknowingly to her. The program that was installed allowed an intruder access to her hard drive and personal information.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or false? Spyware is a program that gathers personal information from your computer without your permission or knowledge.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false? A botnet is an individual infected computer that can be controlled by a command and control server.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following describes a DoS attack? (Choose two.)

A

1- The attack is relatively simple to conduct, even by an unskilled threat actor
2- A network, host, application is sent an enormous quantity of data at a rate which it cannot handle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following describes a DDoS attack? (Choose three.)

A

1- The attack originate from multiple, coordinated source
2- Zombies are controlled by a command and control server
3- A threat actor builds a network of infected host called a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is installed to prevent unwanted advertisements from displaying on your computer?

A

Popup blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following controls traffic to and from your network?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is installed on an end-user workstation or server to detect and remove malware from files and email?

A

virus protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is applied to an OS or application to correct a known security vulnerability or add functionality?

A

patches and update

20
Q

Which of the following is software installed on an end-user workstation or server to detect and remove viruses, worms, and Trojan horses from files and email?

21
Q

Which of the following is software installed on an end-user workstation or server to identify and remove unwanted emails?

A

Spam filter

22
Q

Which of the following is installed on an end-user workstation or server to detect, block, or remove malicious software designed to capture information or deliver adware?

A

antispyware

23
Q

Which of the following is software installed on an end-user workstation to prevent an advertisement windows from displaying?

A

popup blocker

24
Q

What characteristic describes a firewall appliance?

A

a network device that filter access and traffic coming into a network

25
What characteristic describes identity theft?
the use of stolen credential to access private data
26
What characteristic describes spyware?
software that is installed on a user device and collects information about the user
27
What characteristic describes a DoS attack?
an attack that slows or crashes a devices or network service
28
What characteristic describes a virus?
malicious software or code running on an end devices
29
What characteristic describes adware?
software that is installed on a user device and collects information about the user
30
What characteristic describes antivirus software?
application that protect end devices from becoming infected with malicious software.
31
What characteristic describes antispam?
software that identifies email spam and automatically deletes or places them in a junk folder.
32
What characteristic describes a Trojan horse?
Malicious software or code running on an end devices
33
What characteristic describes a DoS attack?
an attack that slows or crashes a devices or network service
34
What characteristic describes phishing?
an email pretending to represent a legitimate organization asking personal information
35
What characteristic describes antivirus software?
application that protect end devices from becoming infected with malicious software
36
What is an example of social engineering?
an unidentified person claiming to be a technician collecting user information from employees
37
What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?
spyware
38
What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?
phishing
39
Which malicious program appears as a legitimate program to deceive the victim, but is in fact an attack tool that can contain malicious code?​
trojan horse
40
What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?​
SYN flooding
41
Which type of attack attempts to overwhelm network links and devices with useless data?
denial of service
42
How does a phisher typically contact a victim?
email
43
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?
antispyware
44
What type of attack is the ping of death?
Denial of service
45
What is the primary means for mitigating virus and Trojan horse attacks?
antivirus software