Module 2 Flashcards

1
Q

Computer Virus

A

Malicious code written to interfere with computer operations and cause damage to data and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware

A

Software designed to harm devices or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social Engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Common Types of Phishing Attacks

A

Business Email Compromise (BEC)

Spear Phishing

Whaling

Vishing

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Business Email Compromise(BEC)

A

A threat actor sends an email message that seems to be from unknown source to make a seemingly legitimate request for information, in order to obtain a financial advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spear Phishing

A

A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Whaling

A

A form of spear phishing. Threat actors target company executives to gain access to sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vishing

A

Exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Smishing

A

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Common Types of Malware Attacks

A

Viruses

Worms

Ransomware

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Viruses

A

Malicious code written to interfere with computer operations and cause damage to data and software. A virus needs to be initiated by a user (i.e., a threat factor), who transmits the virus via a malicious attachment or file download. When someone opens the malicious attachment or download, the virus hides itself and other files and now infected system. When the infected files are opened, it allows the virus to insert its own code to damage and/or destroy data in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worms

A

Malware that can duplicate and spread itself across systems on its own. In contrast to a virus, a worm does not need to be downloaded by user. Instead, it self-replicates and spreads from an already infected computer to other devices on the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A

Malware that’s used to gather and sell information without consent. Spyware can be used to access devices. This allows thread actors to collect personal data, such as private emails, text, voice and image recordings, and locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why Social Engineering Attacks are Effective

A

Authority

Intimidation

Consensus/Social Proof

Scarcity

Familiarity

Trust

Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

USB Baiting

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to defined an unknowingly infected network.

18
Q

CISSP Domains

A

Security and Risk Management

Asset Security

Security Architecture and Engineering

Communications and Network Security

Identify and Access Management

Security Assessment and Testing

Security Operations

Software Development Security

19
Q

Security and Risk Management

A

Defines security goals and objectives, risk mitigation, compliance, business continuity, and the law.

20
Q

Asset Security

A

Secure his digital and physical assets. It’s also related to storage, maintenance, retention, and destruction of data.

21
Q

Security Architecture and Engineering

A

Optimize his data security by ensuring effective tools, systems, and processes are in place.

22
Q

Communication and Network Security

A

Manage and secure physical networks and wireless communications.

23
Q

Identify and Access Management

A

Keep data secure, by ensuring users follow established policies to control and manage physical assets, like office spaces, and logical assets, such as networks and applications.

24
Q

Security Assessment and Testing

A

Conducting security control testing, collecting an analyzing data, and conducting security audits to monitor for risk, threats, and vulnerabilities.

25
Q

Security Operations

A

Conducting investigations and implementing preventative measures.

26
Q

Software Development Security

A

Used secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services.

27
Q

Password Attack

A

Falls under the communication and network security domain of CISSP

28
Q

Social Engineering Attack

A

Falls under the security and risk management domain of CISSP

29
Q

Physical Attack

A

Falls under the asset security domain of CISSP

30
Q

Adversarial Artificial Intelligence Attack

A

Falls under both the communication and network security and the identity and access management domains of CISSP

31
Q

Supply-Chain Attack

A

Fall under several domains, including but not limited to the security and risk management, security architecture and engineering, and security operations domains of CISSP.

32
Q

Cryptographic Attack

A

Falls under the communication and network security domain of CISSP

33
Q

Threat Actor Types

A

Advanced Persistent Threats

Insider Threats

Hacktivists

34
Q

Advanced Persistent Threats (APTs)

A

Have significant expertise accessing an organizations network without authorization. APTs tend to research their targets in advance and can remain undetected for an extended period of time.

35
Q

Insider Threats

A

Abuse their authorized access to obtain data that may harm an organization.

36
Q

Hacktivist

A

Threat actors that are driven by a political agenda.

37
Q

Hacker

A

Any person who uses computers to gain access to computer systems, networks, or data. They can be beginner or advanced technology professionals who use their skills for a variety of reasons.

38
Q

Hacker Types

A

Authorized Hackers (Ethical Hackers)

Semi-Authorized Hackers (Researchers)

Unauthorized Hackers (Unethical Hackers)

39
Q

Authorized Hackers (Ethical Hackers)

A

Follow a code of ethics and adhere to the law to conduct organizational risk evaluations. They are motivated to safeguard people and organizations from malicious threat actors.

40
Q

Semi-Authorized Hackers (Researchers)

A

Search for vulnerabilities but don’t take advantage of the vulnerabilities they find.

41
Q

Unauthorized Hackers (Unethical Hackers)

A

They are malicious threat actors who do not follow or respect the law. Their goal is to collect self confidential data for financial gain.