module 15 security consideration Flashcards

1
Q

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

A

data loss or manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kind of threat is described when a threat actor prevents legal users from accessing data services?

A

Disruption of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of threat is described when a threat actor steals scientific research data?

A

Information theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of threat is described when a threat actor overloads a network to deny other users network access?

A

disruption of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What kind of threat is described when a threat actor alters data records?

A

data loss or manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What kind of threat is described when a threat actor is stealing the user database of a company?

A

information theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Eliseo opened an email sent to him by his brother, Lomiel. A few hours later, Eliseo received several phone calls from friends saying that they received emails from him that he did not knowingly send.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Noah downloaded a file from the internet. Shortly after he opened the file, his hard drive crashed, and he lost all information on his computer.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Safa was surfing the internet when a program appeared claiming that she had won a prize. When she clicked to see what prize she had won, a program was installed on her computer unknowingly to her. The program that was installed allowed an intruder access to her hard drive and personal information.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or false? Spyware is a program that gathers personal information from your computer without your permission or knowledge.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false? A botnet is an individual infected computer that can be controlled by a command and control server.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following describes a DoS attack? (Choose two.)

A

1- The attack is relatively simple to conduct, even by an unskilled threat actor
2- A network, host, application is sent an enormous quantity of data at a rate which it cannot handle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following describes a DDoS attack? (Choose three.)

A

1- The attack originate from multiple, coordinated source
2- Zombies are controlled by a command and control server
3- A threat actor builds a network of infected host called a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is installed to prevent unwanted advertisements from displaying on your computer?

A

Popup blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following controls traffic to and from your network?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is installed on an end-user workstation or server to detect and remove malware from files and email?

A

virus protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is applied to an OS or application to correct a known security vulnerability or add functionality?

A

patches and update

20
Q

Which of the following is software installed on an end-user workstation or server to detect and remove viruses, worms, and Trojan horses from files and email?

A

Antivirus

21
Q

Which of the following is software installed on an end-user workstation or server to identify and remove unwanted emails?

A

Spam filter

22
Q

Which of the following is installed on an end-user workstation or server to detect, block, or remove malicious software designed to capture information or deliver adware?

A

antispyware

23
Q

Which of the following is software installed on an end-user workstation to prevent an advertisement windows from displaying?

A

popup blocker

24
Q

What characteristic describes a firewall appliance?

A

a network device that filter access and traffic coming into a network

25
Q

What characteristic describes identity theft?

A

the use of stolen credential to access private data

26
Q

What characteristic describes spyware?

A

software that is installed on a user device and collects information about the user

27
Q

What characteristic describes a DoS attack?

A

an attack that slows or crashes a devices or network service

28
Q

What characteristic describes a virus?

A

malicious software or code running on an end devices

29
Q

What characteristic describes adware?

A

software that is installed on a user device and collects information about the user

30
Q

What characteristic describes antivirus software?

A

application that protect end devices from becoming infected with malicious software.

31
Q

What characteristic describes antispam?

A

software that identifies email spam and automatically deletes or places them in a junk folder.

32
Q

What characteristic describes a Trojan horse?

A

Malicious software or code running on an end devices

33
Q

What characteristic describes a DoS attack?

A

an attack that slows or crashes a devices or network service

34
Q

What characteristic describes phishing?

A

an email pretending to represent a legitimate organization asking personal information

35
Q

What characteristic describes antivirus software?

A

application that protect end devices from becoming infected with malicious software

36
Q

What is an example of social engineering?

A

an unidentified person claiming to be a technician collecting user information from employees

37
Q

What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?

A

spyware

38
Q

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

A

phishing

39
Q

Which malicious program appears as a legitimate program to deceive the victim, but is in fact an attack tool that can contain malicious code?​

A

trojan horse

40
Q

What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?​

A

SYN flooding

41
Q

Which type of attack attempts to overwhelm network links and devices with useless data?

A

denial of service

42
Q

How does a phisher typically contact a victim?

A

email

43
Q

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?

A

antispyware

44
Q

What type of attack is the ping of death?

A

Denial of service

45
Q

What is the primary means for mitigating virus and Trojan horse attacks?

A

antivirus software