Module 2: Securing Networks Flashcards

1
Q

Maintains the interactive Cyberthreat Real-Time Map display of current network attacks.

A

Kapersky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It relates directly to the business continuity of an organization. Breaches can disrupt e-commerce, cause the loss of business data, threaten people’s privacy, and compromise the integrity of information.

A

Network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Many tools help network administrators adapt, develop, and implement threat mitigation techniques.
Two examples are:

A

Cisco Talos Intelligence Group website
Cisco Product Security Incident Response Team (PSIRT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A path by which a threat actor can access a server, host, or network.

A

Attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Originate from inside or outside the corporate network.

A

Attack Vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An internal user, such as an employee, can accidentally or intentionally:

A

*Steal and copy confidential data to removable media, email, messaging software, and other media.
* Compromise internal servers or network infrastructure devices.
* Disconnect a critical network connection and cause a network outage.
* Connect an infected USB drive to a corporate computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The most common vector for data loss includes instant messaging software and social media sites. For instance, intercepted email or IM messages could be captured and reveal confidential information.

A

Email/Social Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A stolen corporate laptop typically contains confidential organizational data. The thief can retrieve valuable personal data if the data is not stored using an encryption algorithm.

A

Unencrypted Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Saving data to the cloud has many potential benefits. However, sensitive data can be lost if access to the cloud is compromised due to weak security settings

A

Cloud Storage Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One risk is that an employee could perform an unauthorized transfer of data to a USB drive. Another chance is that a USB drive containing valuable corporate data could be lost.

A

Removable Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Corporate data should be disposed of thoroughly. For example, confidential data should be shredded when no longer required. Otherwise, a thief could retrieve discarded reports and gain valuable information.

A

Hard Copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passwords are the first line of defense. Stolen passwords or weak passwords which have been compromised can provide an attacker easy access to corporate data.

A

Improper Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly