module 15 security consideration Flashcards
What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
data loss or manipulation
What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?
identity theft
What kind of threat is described when a threat actor prevents legal users from accessing data services?
Disruption of service
What kind of threat is described when a threat actor steals scientific research data?
Information theft
What kind of threat is described when a threat actor overloads a network to deny other users network access?
disruption of service
What kind of threat is described when a threat actor alters data records?
data loss or manipulation
What kind of threat is described when a threat actor is stealing the user database of a company?
information theft
What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?
identity theft
Eliseo opened an email sent to him by his brother, Lomiel. A few hours later, Eliseo received several phone calls from friends saying that they received emails from him that he did not knowingly send.
Worm
Noah downloaded a file from the internet. Shortly after he opened the file, his hard drive crashed, and he lost all information on his computer.
Virus
Safa was surfing the internet when a program appeared claiming that she had won a prize. When she clicked to see what prize she had won, a program was installed on her computer unknowingly to her. The program that was installed allowed an intruder access to her hard drive and personal information.
Trojan Horse
True or false? Spyware is a program that gathers personal information from your computer without your permission or knowledge.
True
True or false? A botnet is an individual infected computer that can be controlled by a command and control server.
False
Which of the following describes a DoS attack? (Choose two.)
1- The attack is relatively simple to conduct, even by an unskilled threat actor
2- A network, host, application is sent an enormous quantity of data at a rate which it cannot handle
Which of the following describes a DDoS attack? (Choose three.)
1- The attack originate from multiple, coordinated source
2- Zombies are controlled by a command and control server
3- A threat actor builds a network of infected host called a botnet
Which of the following is installed to prevent unwanted advertisements from displaying on your computer?
Popup blocker
Which of the following controls traffic to and from your network?
Firewall
Which of the following is installed on an end-user workstation or server to detect and remove malware from files and email?
virus protection
Which of the following is applied to an OS or application to correct a known security vulnerability or add functionality?
patches and update
Which of the following is software installed on an end-user workstation or server to detect and remove viruses, worms, and Trojan horses from files and email?
Antivirus
Which of the following is software installed on an end-user workstation or server to identify and remove unwanted emails?
Spam filter
Which of the following is installed on an end-user workstation or server to detect, block, or remove malicious software designed to capture information or deliver adware?
antispyware
Which of the following is software installed on an end-user workstation to prevent an advertisement windows from displaying?
popup blocker
What characteristic describes a firewall appliance?
a network device that filter access and traffic coming into a network
What characteristic describes identity theft?
the use of stolen credential to access private data
What characteristic describes spyware?
software that is installed on a user device and collects information about the user
What characteristic describes a DoS attack?
an attack that slows or crashes a devices or network service
What characteristic describes a virus?
malicious software or code running on an end devices
What characteristic describes adware?
software that is installed on a user device and collects information about the user
What characteristic describes antivirus software?
application that protect end devices from becoming infected with malicious software.
What characteristic describes antispam?
software that identifies email spam and automatically deletes or places them in a junk folder.
What characteristic describes a Trojan horse?
Malicious software or code running on an end devices
What characteristic describes a DoS attack?
an attack that slows or crashes a devices or network service
What characteristic describes phishing?
an email pretending to represent a legitimate organization asking personal information
What characteristic describes antivirus software?
application that protect end devices from becoming infected with malicious software
What is an example of social engineering?
an unidentified person claiming to be a technician collecting user information from employees
What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?
spyware
What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?
phishing
Which malicious program appears as a legitimate program to deceive the victim, but is in fact an attack tool that can contain malicious code?
trojan horse
What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?
SYN flooding
Which type of attack attempts to overwhelm network links and devices with useless data?
denial of service
How does a phisher typically contact a victim?
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?
antispyware
What type of attack is the ping of death?
Denial of service
What is the primary means for mitigating virus and Trojan horse attacks?
antivirus software