Module 3 Flashcards

1
Q

What is the primary goal of cyber security?

A

To protect computers and data from risks and threats

Cyber security is akin to securing the doors to our homes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define ‘Cracker’ in the context of cyber security.

A

A computer-savvy programmer who creates attack software

Crackers are often associated with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are ‘Script Kiddies’?

A

Unsophisticated computer users who execute pre-written programs

They often lack deep technical knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List three leading threats in cyber security.

A
  • Viruses
  • Worms
  • Trojan Horses

Other threats include logic bombs, social engineering, rootkits, and botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a virus function?

A

It attaches itself to a program or file and activates upon execution

Viruses can be benign or malignant and may cause data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a worm in cyber security?

A

An independent program that replicates itself across network connections

Worms can spread without user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Logic Bomb?

A

Malware that executes upon certain conditions being met

Often used in legitimate programs that malfunction under specific circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: A Trojan Horse is a benign program.

A

False

A Trojan Horse masquerades as a benign program but harms the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is social engineering?

A

Manipulating people into divulging confidential information

Techniques often resemble confidence tricks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Phishing.

A

Counterfeit emails requesting sensitive information

Commonly includes requests for SSN, credit card numbers, or passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Pharming?

A

Counterfeit web pages that mimic real websites to collect information

These pages extract sensitive account information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Man in the Middle attack?

A

An attacker pretends to be a legitimate network access point

This allows the attacker to intercept communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a rootkit?

A

A collection of programs installed by a hacker to maintain access

Rootkits can hide their presence and modify the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List three examples of personal information.

A
  • Social Security Number
  • Driver’s license number
  • Account passwords

This information can be used for identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are common symptoms of a security compromise?

A
  • Antivirus detects a problem
  • Unexplained disk space loss
  • Pop-ups selling security software
  • Unexpected files or transactions

Other symptoms include slow performance and unusual system behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can excessive pop-up windows indicate?

A

Possible spyware infection

This is a common symptom along with changes to browser settings.

17
Q

What is the purpose of anti-virus software?

A

To detect and destroy malware before it causes damage

Regular updates are essential for effectiveness.

18
Q

What does ‘Defense in depth’ mean?

A

Using multiple layers of defense to address security threats

This strategy enhances overall security.

19
Q

What is the function of a firewall?

A

Acts as a barrier between a computer and the internet to prevent unauthorized access

Firewalls filter incoming and outgoing network traffic.

20
Q

How should one protect their operating system?

A

Regularly apply patches and updates

Both Microsoft and Apple provide updates to enhance security.

21
Q

What are the characteristics of a strong password?

A
  • At least ten characters long
  • Contains characters from at least two of four types
  • Does not include easily guessable personal information

This helps protect against unauthorized access.

22
Q

Fill in the blank: Always use a _______ browser for online activities.

A

secure

This is crucial for protecting sensitive transactions.

23
Q

What should you do if you suspect a cyber security incident?

A

Notify your organization’s help desk immediately

Do not attempt to investigate the incident on your own.

24
Q

List four risks caused by poor security knowledge.

A
  • Identity Theft
  • Monetary Theft
  • Legal Ramifications
  • Sanctions or termination

These risks affect both individuals and organizations.

25
Q

What are the top vectors for vulnerabilities according to the SANS Institute?

A
  • Web Browser
  • IM Clients
  • Web Applications
  • Excessive User Rights

These are frequently exploited by cyber criminals.