NETWORK & SECURITY FOUNDATIONS OVERVIEW Flashcards

1
Q

What device forwards data packets to all connected ports?

A

HUB

A hub is also known as a multi-port repeater.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary function of a modem?

A

Sending & receiving data, allows computers to transport digital info over analog lines

A modem connects to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which device amplifies or regenerates signals to extend a network?

A

REPEATER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a switch do in a network?

A

Connects devices in a specific network and allows them to communicate efficiently using MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of a bridge in networking?

A

Joins 2 separate network segments together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary role of a router?

A

Forwards data packets between two or more networks and determines the best path for transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does an edge router do?

A

Connects internal networks to external networks (Internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a core router?

A

Routes data within a large network (Internet backbone).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of a wireless range extender (WRE)?

A

Extends the coverage of a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a wireless access point (WAP)?

A

Connects wireless devices to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary security device on a network?

A

FIREWALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does an inter-provider border router do?

A

Connects ISP to ISP, forming the core or backbone of the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of cable uses a foil or mesh shield to reduce noise and crosstalk?

A

STP (Shielded Twisted Pair)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a key characteristic of unshielded twisted pair (UTP) cabling?

A

Suitable for both office and home environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is coaxial cable primarily used for?

A

Carrying cable TV signals and broadband cable Internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is data transmitted in fiber optic cables?

A

Using pulses of light.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two types of fiber optic cables?

A

Single-mode & Multi-mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of fiber optic cable is best for long cable runs?

A

Single-mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a patch cable?

A

A short Ethernet twisted pair cable with RJ 45 connectors on both ends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which category of twisted pair cable is required for Gigabit network compatibility?

A

Category 5E.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of network focuses on personal workspace and can use NFC or Bluetooth?

A

PAN (Personal Area Network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What defines a Local Area Network (LAN)?

A

A small computer network typically confined to a single room or building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which network type connects multiple buildings?

A

CAN (Campus Area Network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the characteristic of a Metropolitan Area Network (MAN)?

A

Data network design used for a city, town, or municipality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What type of topology connects all devices to a central hub or switch?

A

Star topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In which topology do packets navigate device-to-device until reaching their destination?

A

Ring topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the advantage of a mesh topology?

A

Enables multiple data paths between any two devices to safeguard against link failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which network architecture is centralized?

A

Client/Server model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In a Peer-to-Peer (P2P) architecture, how is configuration handled?

A

Decentralized, with each device requiring individual configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What command is used to measure round-trip time to a specific destination?

A

PING.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does the command TRACERT (or TRACEROUTE) do?

A

Traces the path packets take to reach a network destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What command displays IP configuration settings in Windows?

A

IPCONFIG.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does NSLOOKUP do?

A

Provides name to IP information (DNS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the purpose of the ARP command?

A

Displays and modifies the ARP table, mapping IP addresses to MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which command identifies active TCP connections?

A

NETSTAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is NMAP used for?

A

Network scanning to find hosts and open ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What does ARP stand for?

A

Address Resolution Protocol

ARP maps IP addresses to MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What command is used to display active TCP connections on Windows?

A

NETSTAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the purpose of the NETSTAT command?

A

Displays network connections and statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What does NMAP stand for?

A

Network Mapper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the primary function of the ROUTE command?

A

Displays and manipulates the IP routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What protocol does FTP use for file transfer?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Fill in the blank: TFTP uses ______, which does not guarantee accurate delivery of files.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the main security feature of SSH?

A

Secure remote device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What does WHOIS provide?

A

Domain information lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is TCPDUMP used for?

A

Packet capturing utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What command is used to display the IP configuration on a Windows computer?

A

IPCONFIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What command can a user run to test latency to a specific destination?

A

PING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the purpose of the IFCONFIG command in Linux?

A

Views detailed information about network interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which OSI model layer is responsible for network addressing and routing?

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

At which layer of the OSI model does TCP operate?

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the primary function of the Data Link layer?

A

Node-to-node data transfer and error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the highest layer of the OSI model?

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What does the Presentation layer handle in the OSI model?

A

Formatting and encrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Fill in the blank: The IEEE 802.11 wireless standard includes ______.

A

A, B, G, N, AC, AX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What type of hypervisor runs directly on hardware?

A

Type 1 hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is a key feature of a Type 2 hypervisor?

A

Runs on top of a host operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What does IaaS stand for in cloud computing?

A

Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the main responsibility of the user in a PaaS model?

A

Managing applications and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What type of cloud deployment model is dedicated to a single organization?

A

Private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What defines a public cloud?

A

Cloud services are shared among multiple organizations over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Fill in the blank: SaaS focuses on ______ delivery through the internet.

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which command is used for DNS resolution of a domain name?

A

NSLOOKUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which layer of the OSI model is responsible for breaking data into packets?

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the primary function of the Session layer in the OSI model?

A

Establishing, maintaining, and terminating connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What does a hybrid cloud combine?

A

Private and public clouds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is the OSI layer that includes IPX?

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is the command to display the mapping of IP addresses to MAC addresses on Windows?

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What type of hypervisor is used for maximum virtual machine capacity?

A

Type 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is the main advantage of SaaS?

A

No need for individual installations or updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is the role of the Presentation layer in the OSI model?

A

Formatting, encrypting, and decrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is an example of a SaaS application?

A

Gmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is a private cloud?

A

Cloud infrastructure dedicated to a single organization, providing more control & security

Examples include services like Gmail, Google Drive, MS One Drive, and Zoom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What defines a public cloud?

A

Cloud services provided to multiple organizations over the internet, shared between users but isolated

Accessible over the public internet to anyone interested in subscribing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is a community cloud?

A

Cloud infrastructure shared by multiple organizations with common interests or regulatory concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is a hybrid cloud?

A

A combination of private & public clouds, allowing data & applications to move between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What does multi-cloud mean?

A

The use of multiple cloud services from different providers to meet specific needs or improve redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What distinguishes a public cloud model?

A

Accessible over the public internet to anyone interested in subscribing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which cloud deployment often utilizes exclusive (non-shared) hardware?

A

Private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

How is a community cloud defined?

A

Shared among multiple organizations with similar objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What defines the hybrid cloud model in terms of IT asset locations?

A

Mix of on-premises & cloud-based services for IT assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What describes a public cloud?

A

Provides cloud services to just about anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

In a hybrid cloud, what is known as data in transit?

A

Data traveling over the WAN connection between private & public clouds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What does least privilege mean in security?

A

Restricts access rights for users to minimum levels necessary for performing their tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What is risk in the context of security?

A

The potential or probability that a loss may occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What does anti-malware do?

A

Helps detect & remove malicious software, such as viruses or malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is the purpose of a firewall?

A

Controls incoming & outgoing network traffic based on predetermined security rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What is the definition of a vulnerability?

A

A weakness or flaw in hardware, software, or facilities that can be taken advantage of to compromise security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What is an exploit?

A

A method or tool used to take advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What is a threat in cybersecurity?

A

Anything that has the potential to cause harm to your assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is an attack in cybersecurity?

A

An action taken to harm your assets by exploiting vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is a threat actor?

A

A person or group that poses a threat, intending to carry out attacks or harm assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What does patch management involve?

A

Regularly updating software & applying patches to address known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

True or False: In a private cloud, companies like AWS and Microsoft Azure are responsible for physical data center security.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What type of vulnerability is created by setting a password to ‘password01’?

A

Weak password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What defines a zero-day attack?

A

An attack that exploits a previously unknown vulnerability in software or hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is a white hat hacker?

A

IT professionals who specialize in penetrating & compromising network security to help an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What is a black hat hacker?

A

Individuals with malicious intent who breach systems for profit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What is a gray hat hacker?

A

Individuals who break laws by not having permission but do not have malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What is a hacktivist?

A

A hacker who engages in hacking activities to promote a social or political agenda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What is an insider threat?

A

Individuals within an organization who misuse their access privileges to compromise security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What is SQL injection?

A

Allows attackers to take control of a database by inserting special commands into input boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What is a buffer overflow attack?

A

An attacker enters text that is too large to fit within a region of memory called a buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What is the goal of a phishing attack?

A

To steal sensitive info like usernames & passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What is a denial of service (DoS) attack?

A

Aims to disrupt availability of services by overwhelming a network or server with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What is a smurf attack?

A

A DDoS attack where multiple computers reply to ICMP requests, overwhelming the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What is the definition of eavesdropping?

A

Unauthorized listening to private conversations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What is packet sniffing?

A

Capturing IP packets & analyzing TCP/IP network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What is zero-day exploit?

A

An exploit or vulnerability not known yet, requiring a patch to be remedied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What is an advanced persistent threat (APT)?

A

A network attack where an unauthorized person gains access and stays undetected for a long period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What does social engineering involve?

A

Manipulating individuals to divulge confidential info or perform actions that may compromise security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What is a rogue access point?

A

A fake wireless network set up to trick users into joining, allowing attackers to capture data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

In a man-in-the-middle attack, where does the attacker position themselves?

A

Between two communicating parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What is the primary goal of a deauth attack?

A

To force any client off the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What is a fake access point also known as?

A

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

What is a security risk that originates from individuals within an organization, such as employees or contractors?

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What type of attack is performed when an attacker is inserting text that is too large to fit within a region of memory?

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

What is an attacker attempting to breach the network remotely considered?

A

External threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Which type of DoS attack involves sending oversized or malformed ping packets to crash the target system?

A

Ping of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What exploit includes breaching the network cable and using a packet sniffer to listen and record the traffic on the network?

A

Wiretapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

A wireless deauthentication attack is an example of which type of attack?

A

Denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Which attack floods a system with traffic to prevent legitimate activities or transactions from occurring?

A

Denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

What type of attack targets an SQL database using the input field of a user?

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Describe man-in-the-middle.

A

A false server intercepts communications from a client by impersonating the intended server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

What type of attack does the attacker attempt to send unauthorized commands to a back-end database through a web application?

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

What occurs when an attacker gains unauthorized access to a computer and modifies browser security settings?

A

Data modification

127
Q

What does an attacker use a Trojan horse for to forward usernames and passwords to an anonymous email address?

A

Data export

128
Q

What type of attack involves trying all possible combinations of a password and user ID?

A

Brute-force attack

129
Q

What is it called when an attacker uses exposed data from a data breach to attempt to access accounts of another online retailer?

A

Credential surfing

130
Q

What attack uses a list of commonly used access credentials to attempt to gain access to an online account?

A

Dictionary attack

131
Q

What type of attack occurs when an attacker tries to gain access to a system by disguising their computer as another computer?

A

IP address spoofing

132
Q

What type of attack involves an attacker using a program to take control of a connection by pretending to be each end of the connection?

A

Session hijacking

133
Q

What occurs when an attacker intercepts messages between two parties before transferring them to the correct destination?

A

Man-in-the-middle attack

134
Q

What type of attack does an attacker use a false ID to gain physical access to IT infrastructure?

A

Social engineering

135
Q

What type of email attack involves sending emails claiming that an online account has been locked and provides a fake link?

136
Q

What type of attack uses a DNS poisoning strategy to direct users from a legitimate website to the attacker’s website?

137
Q

What are examples of social engineering?

A

Impersonation, phishing

138
Q

What is risk avoidance?

A

Eliminating a particular risk by getting rid of its cause

139
Q

What is risk acceptance?

A

Not taking any action to reduce risk

140
Q

What is risk mitigation?

A

Decrease possibility of occurrence of risk

141
Q

What is risk transfer?

A

Shifting the potential loss to a third party

142
Q

What is a honeypot?

A

A decoy system that is intentionally vulnerable and filled with fabricated data to lure attackers

143
Q

What risk management strategy involves eliminating the threat or vulnerability to completely eliminate the associated risk?

A

Risk avoidance

144
Q

What risk management approach is demonstrated by opting to keep a network device operational despite being aware of its risk?

A

Risk acceptance

145
Q

Which risk management approach entails reducing the likelihood of a risk occurring or reducing the impact if a risk does occur?

A

Risk mitigation

146
Q

What are two ways to protect a computer from malware?

A
  • Use antivirus software
  • Keep software up to date
147
Q

What type of tool should Kyle use to attract an attacker and analyze their activity?

148
Q

If a company installs a state-of-the-art firewall, what are they primarily engaged in?

A

Risk mitigation

149
Q

What is an example of risk acceptance?

A

Ignoring minor security risks because the cost to address them would outweigh the potential loss

150
Q

What strategy involves sharing some of the risk burden with someone else, such as an insurance policy?

A

Risk transference

151
Q

What does the CIA triad help protect?

A

Information from unauthorized disclosure and modification while ensuring it is accessible to authorized users

152
Q

What does confidentiality in the CIA triad refer to?

A

Secrecy and privacy of data

153
Q

What is the goal of integrity in the CIA triad?

A

Ensuring accuracy and trustworthiness of data

154
Q

What is the goal of availability in the CIA triad?

A

Ensuring authorized users have access to network, systems, applications, or data when required

155
Q

Data encryption at rest primarily addresses which component of the CIA triad?

A

Confidentiality

156
Q

What accurately defines a security vulnerability?

A

A defect or imperfection in hardware, software, or infrastructure that could be exploited to undermine security

157
Q

What CIA component is breached when a ransomware attack encrypts all files on a company’s server?

A

Availability

158
Q

What CIA components are compromised in a man-in-the-middle (MITM) attack?

A
  • Confidentiality
  • Integrity
159
Q

What CIA component is affected when sensitive emails are intercepted on a compromised Wi-Fi network?

A

Confidentiality

160
Q

Ensuring that data is accurate and hasn’t been tampered with relates to which CIA triad?

161
Q

What is the best practice to secure backup drives containing sensitive information?

A

Store the devices in an access controlled server room

162
Q

What CIA triad component is affected by a flood in the server room causing significant damage to hardware?

A

Availability

163
Q

What are checksums and cryptographic hashes primarily used to ensure?

164
Q

What CIA triad component is impacted when a critical software application fails to start due to an expired license key?

A

Availability

165
Q

What CIA triad component is affected when Kim’s exam results are accidentally sent to Karen?

A

Confidentiality

166
Q

In cybersecurity, what does CIA stand for?

A

Confidentiality, Integrity, Availability

167
Q

What CIA triad component is affected when Cynthia is unable to turn in her application on time due to a website crash?

A

Availability

168
Q

What CIA triad component is a driver for enabling data encryption?

A

Confidentiality

169
Q

What CIA triad component is a driver for implementing and monitoring controls?

A

Confidentiality

170
Q

What CIA triad component requires IP packets to be retransmitted if the receiving host has an invalid checksum value?

171
Q

What is an example of a violation of confidentiality?

A

A company stores sensitive customer data without access controls

172
Q

What is an example of a violation of availability?

A

A new employee hasn’t been issued access credentials to the company’s network for needed info

173
Q

What does a company use hash value comparisons to determine?

A

If the data in a database has changed

174
Q

What does a company do when updating devices it provides to employees?

A

Ensure that each employee has consistent network access

175
Q

What are security policies?

A

Guidelines and rules set by an organization to protect its information and technology assets

176
Q

What does a data handling policy outline?

A

Procedures and guidelines for managing and securing company data throughout its lifecycle

177
Q

What does a password policy specify?

A

Requirements for creating and managing passwords within the organization

178
Q

What does a Bring Your Own Device (BYOD) policy set?

A

Rules for employees who want to use their personal devices

179
Q

What does a privacy policy document require?

A

How an organization collects, uses, discloses, and manages both intellectual property and personally identifiable information

180
Q

Which principle in network security design advocates for the use of cryptographic techniques?

181
Q

What must each sub-policy in an information security policy document clearly contain?

A

The specific compliance obligations the sub-policy fulfills

182
Q

What should we keep up to date?

A

Office suites, browser plugins, and anti-virus

183
Q

What are the two states of data?

A
  • In transit
  • At rest
184
Q

What principle involves limiting user rights and access control permissions to the minimum necessary?

A

Least privilege

185
Q

What does complete mediation ensure?

A

Check authentication every time

186
Q

What principle requires that critical tasks involve more than one person?

A

Separation of privilege/duties

187
Q

What does fail-safe default emphasize?

A

Default to maximum security, access denied by default

188
Q

What does economy of mechanism suggest?

A

Keep security systems simple, use proven components

189
Q

What does least common mechanism advocate?

A

Use separate devices, tools, applications for different users or activities

190
Q

What does human-centered design focus on?

A

Designing with the user in mind

191
Q

What does psychological acceptability ensure?

A

Security design is simple and intuitive

192
Q

What does open design emphasize?

A

Security of the system shouldn’t depend on its design being secret

193
Q

What does the zero trust principle state?

A

Never trust, always verify

194
Q

What does defense in depth refer to?

A

A multi-layered approach to security

195
Q

What principle ensures that users are only granted the minimum level of access necessary to perform their tasks?

A

Least privilege

196
Q

What principle focuses on ensuring the system remains secure even if individual components fail?

197
Q

Which principle ensures access to resources is checked against the security policy even after initial authentication?

A

Complete mediation

198
Q

What principle emphasizes the importance of keeping security mechanisms transparent and understandable?

A

Open design

199
Q

What principle emphasizes the need to verify the identity of users and restrict access based on their roles?

A

Separation of privilege

200
Q

What principle suggests that security mechanisms should be easy to understand and use?

A

Psychological acceptability

201
Q

What aspect of zero-trust architecture could have prevented unauthorized access when an employee connected to the company network remotely from a public Wi-Fi hotspot?

A

Zero trust network access (ZTNA)

202
Q

What aspect of zero-trust architecture could have prevented unauthorized access when connecting to a company network remotely from a public Wi-Fi hotspot?

A

Zero Trust Network Access (ZTNA)

ZTNA ensures that only authorized users and devices can access specific resources.

203
Q

Which aspect of zero-trust architecture could have mitigated a data breach due to a compromised employee device?

A

Least Privilege Access

This principle limits user access to only what is necessary for their role.

204
Q

What principle is enforced when a company allows less complex passwords with two-factor authentication for better user-friendliness?

A

Psychological Acceptability

This principle focuses on making security measures easier for users to comply with.

205
Q

What principle does a mobile banking app utilize by terminating all active sessions after detecting unauthorized access attempts?

A

Fail-Safe

This principle ensures that systems default to a secure state in case of an error.

206
Q

What technology is essential for achieving effective zero trust architecture?

A

Multi-Factor Authentication (MFA)

MFA requires multiple forms of verification to enhance security.

207
Q

What practice best exemplifies separation of duties in incident response at a software company?

A

One team detects & reports security incidents, while a different team analyzes & responds to these incidents

This practice prevents conflicts of interest and enhances security.

208
Q

How does zero trust handle internal and external threats?

A

Treats all network traffic with the same level of suspicion

This approach minimizes risk from both internal and external sources.

209
Q

What principle enhances security through simplicity by using a simple, well-understood algorithm?

A

Economy of Mechanism

This principle emphasizes simplicity in design to improve security.

210
Q

Why is separation of duties essential in IT security?

A

Helps prevent any one individual from having too much control over a critical process

This reduces the risk of fraud and errors.

211
Q

What principle is a development team committed to when designing a web application to protect sensitive info in case of an error?

A

Fail-Safe

This principle ensures that systems default to a secure state in case of an error.

212
Q

What goal is an organization pursuing when designing an intuitive, user-friendly, and secure info system dashboard?

A

Human-Centeredness

This approach focuses on user experience and usability.

213
Q

What principle is reinforced when a company holds meetings to inform employees about session timeouts and the risks of workarounds?

A

Psychological Acceptability

This principle encourages understanding and compliance among users.

214
Q

What practice requires a manager to verify any changes made to a client’s electronic profile by an employee?

A

Separation of Duties

This ensures oversight and accountability in sensitive operations.

215
Q

What are the factors on which rules in packet filtering firewalls are based?

A
  • Source IP address
  • Destination IP address
  • Port numbers
  • Protocol types (IP, TCP, UDP, ICMP)

These factors help determine whether to allow or block traffic.

216
Q

What does stateful inspection in firewalls track?

A

The state of active connections

This allows the firewall to determine if incoming packets are part of an established session.

217
Q

What is required before allowing traffic into the network in stateful inspection firewalls?

A

A prior outbound request

This helps ensure that only legitimate traffic is allowed.

218
Q

What type of firewall inspects the content of packets?

A

Application-Level Firewall

This firewall filters traffic based on specific application data.

219
Q

What type of firewall acts as intermediaries between internal and external networks?

A

Proxy Firewall

This firewall hides clients’ identities while inspecting traffic.

220
Q

What does Unified Threat Management (UTM) provide?

A

Single device protection from a variety of threats

UTM consolidates multiple security features into one device.

221
Q

What distinguishes Intrusion Detection Systems (IDS) from Intrusion Prevention Systems (IPS)?

A

IDS can only detect, whereas IPS can prevent

IDS alerts administrators, while IPS actively blocks threats.

222
Q

What is a solution that can help detect and prevent unauthorized activities by an insider attempting to access sensitive information?

A

IDS & IPS

These systems work together to monitor and respond to threats.

223
Q

What capability does an IPS have that an IDS lacks?

A

Blocking detected threats automatically

This allows for immediate response to threats.

224
Q

Which type of firewall can check whether a packet is part of an established connection?

A

Stateful Inspection Firewall

This type of firewall maintains the state of active connections.

225
Q

Which firewall should an organization use that allows or denies packets based on administrator-defined rules?

A

Packet Filtering Firewall

This firewall applies specific rules for traffic control.

226
Q

If an IPS detects a threat, what actions can it take?

A
  • Record the details
  • Report the threat to security admins
  • Take preventative action to stop the threat

These actions help mitigate risks posed by detected threats.

227
Q

What type of firewall inspects all incoming and outgoing messages for harmful content before they reach desktops?

A

Application-Level Firewall

This firewall focuses on content inspection for security.

228
Q

What is the most effective control against SQL injection attacks on a database?

A

Application Layer Firewall

This type of firewall can filter and block malicious traffic.

229
Q

What technology can be put in place to detect potential malware traffic on the network?

A

Firewall

Firewalls can monitor and manage traffic to identify threats.

230
Q

What type of firewall can reject packets that are not part of an active session?

A

Application-Level Firewall

This firewall applies session state tracking.

231
Q

What restrictions are most commonly implemented in packet-filtering firewalls?

A
  • IP source & destination address
  • Direction (inbound or outbound)
  • TCP or UDP source & destination port requests

These restrictions help control network access.

232
Q

What are the three states of data concerning encryption?

A
  • At rest
  • In transit
  • In use

These states define how data is protected during different phases.

233
Q

What is the result of plaintext plus an encryption key?

A

Ciphertext

This is the encrypted output of the encryption process.

234
Q

What type of encryption uses the same key for both encryption and decryption?

A

Symmetric Encryption

This method is faster but requires secure key management.

235
Q

What distinguishes asymmetric encryption from symmetric encryption?

A

Employs different keys for encryption & decryption

Asymmetric encryption uses a public and a private key.

236
Q

In a secure email exchange, which key should Alice use to ensure only Bob can read her message?

A

Bob’s Public Key

This allows Alice to encrypt the message specifically for Bob.

237
Q

What layer of protection is considered the last line of defense in a well-implemented security in depth strategy?

A

Data encryption at rest

This protects data even if physical security is compromised.

238
Q

What key does Bob use to decrypt a message received from Alice using an asymmetric cryptography algorithm?

A

Bob’s Private Key

This key is kept secret and used to decrypt messages encrypted with his public key.

239
Q

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

A

Symmetric

This method simplifies the encryption process.

240
Q

What key should Alice use to encrypt a message to Bob using an asymmetric cryptography algorithm?

A

Bob’s Public Key

This ensures that only Bob can decrypt the message.

241
Q

True or False: Encryption of data at rest provides an additional layer of protection by keeping data protected and inaccessible to attackers even if the system is physically stolen.

A

True

This emphasizes the importance of encrypting sensitive data.

242
Q

Which protocol is the best choice for encrypting communication between a website and its users?

A

TLS

TLS (Transport Layer Security) is widely used for secure web communication.

243
Q

What type of device is designed to handle DDoS attacks and ensure the availability of network services?

A

DDoS Mitigation Appliances

These devices filter out malicious traffic during attacks.

244
Q

What is not typically considered a part of device hardening?

A

Increasing the # of open ports

This would actually increase vulnerability rather than enhance security.

245
Q

What strategy should an organization use for Wi-Fi hardening in response to several cyberattacks?

A

Configure Wi-Fi signal strength to reduce range

This limits the area where unauthorized users can connect.

246
Q

What is an Acceptable Use Policy (AUP)?

A

Agreement between 2 parties outlining permissible & prohibited use of organization’s IT resources

AUP helps establish clear guidelines for technology use.

247
Q

What does a Security Awareness Policy mandate?

A

Training & education of employees about organization’s security measures

This policy promotes a culture of security awareness.

248
Q

What is the purpose of an Asset Classification Policy?

A

Categorizing organization’s assets based on how critical each asset is to the organization’s mission

This helps prioritize security efforts.

249
Q

What does the Asset Protection Policy establish?

A

Methods & measures required to physically & digitally protect an organization’s assets

This policy outlines security practices for asset protection.

250
Q

What does the Asset Management Policy include?

A

Security operations & management of all IT assets within seven domains

This policy ensures comprehensive oversight of IT assets.

251
Q

What is involved in Vulnerability Assessment & Management?

A

Identifying, classifying, & managing vulnerabilities within the organization’s technology environment

This process helps mitigate potential risks.

252
Q

What does Threat Assessment & Monitoring outline?

A

Processes for continuously monitoring & assessing threats that could impact the organization’s IT infrastructure

This helps in proactive threat management.

253
Q

What threat involves looking for an open wireless network while driving?

A

War Driving

This activity is often associated with searching for unsecured networks.

254
Q

What is the mitigation for War Driving?

A
  • Decrease wireless range
  • Hide SSID

These actions minimize the visibility of the network.

255
Q

What is War Chalking?

A

Marking an area after SSID & credentials are known

This practice helps others find unsecured networks.

256
Q

What is the mitigation for War Chalking?

A
  • Use WPA2 or WPA3
  • Enable MAC filtering
  • Hide SSID

These measures enhance network security.

257
Q

What does WEP/WPA cracking involve?

A

Scanning & determining the pre-shared key

This is a method used to compromise wireless security.

258
Q

What is the mitigation for WEP/WPA cracking?

A

Use stronger encryption protocols, such as WPA2 or WPA3

Stronger encryption makes it more difficult to crack keys.

259
Q

What is an Evil Twin attack?

A

Setting up a rogue WAP for legitimate users to sniff data

This attack tricks users into connecting to an unsecured network.

260
Q

What is the mitigation for Evil Twin attacks?

A

Wireless Intrusion Prevention Systems (WIPS)

WIPS can detect and prevent rogue access points.

261
Q

What is a Rogue Access Point?

A

An WAP installed on the network without the IT team’s knowledge

This poses a security risk by allowing unauthorized access.

262
Q

What is the mitigation for Rogue Access Points?

A
  • Switch port tracing
  • Monitor mode scanning
  • Rogue detector

These practices help identify unauthorized devices.

263
Q

What is the threat of DoS/DDoS?

A

Slowing a computer or network to a halt after saturating its resources

This disrupts normal operations and services.

264
Q

What is the mitigation for DoS/DDoS attacks?

A
  • Monitor normal traffic patterns
  • Compare signatures of incoming traffic
  • Use an anti-DoS/DDoS device

These actions help manage and mitigate attacks.

265
Q

What is an ICMP (Ping) Flood attack?

A

Sends a large number of ICMP (Ping) packets to a system

This can overwhelm the target system and disrupt services.

266
Q

What is the mitigation for ICMP Flood attacks?

A

Block ICMP packets on firewall

This prevents the attack from overwhelming the system.

267
Q

What is a Smurf attack?

A

Sends a large number of ICMP packets to a network’s broadcast address using a spoofed source IP

This amplifies the attack and floods the target network.

268
Q

What is the mitigation for Smurf attacks?

A
  • Disable IP broadcast
  • Block ICMP packets on firewall

These measures prevent the attack from being effective.

269
Q

What is a Fraggle attack?

A

Sends spoofed UDP packets to a specific broadcast address

This can also flood the target network with traffic.

270
Q

What is the mitigation for Fraggle attacks?

A
  • Disable IP broadcast
  • Block ICMP packets on firewall

These actions help control incoming traffic.

271
Q

What is a Buffer Overflow attack?

A

Puts more data in memory buffer than it can handle

This can lead to crashes or exploitation of vulnerabilities.

272
Q

What is the mitigation for Buffer Overflow attacks?

A

Detect vulnerabilities in code

Regular code audits can help identify and fix issues.

273
Q

What is an Injection attack?

A

Injects malicious data or script in a web application

This type of attack targets input validation weaknesses.

274
Q

What is the mitigation for Injection attacks?

A

User server-side validation and validate & sanitize input data

These practices help secure web applications.

275
Q

What is Broken Authentication?

A

Uses brute-force & dictionary attacks to gain access

This exploits weak authentication mechanisms.

276
Q

What is the mitigation for Broken Authentication?

A
  • Implement multi-factor authentication
  • Implement complex passwords

These measures enhance security against unauthorized access.

277
Q

What is Sensitive Data Exposure?

A

Theft of encryption keys or MitM attack on clear text data in transit

This compromises data confidentiality.

278
Q

What is the mitigation for Sensitive Data Exposure?

A

Avoid storing sensitive data (secure data)

This reduces the risk of data breaches.

279
Q

What is an injection vulnerability?

A

Injects malicious data or script in a web application

280
Q

What is a method to prevent injection vulnerabilities?

A

Validate & sanitize input data

281
Q

What is broken authentication?

A

Use brute-force & dictionary attacks to gain access

282
Q

What can be implemented to enhance authentication security?

A

Implement multi-factor authentication

283
Q

What is sensitive data exposure?

A

Theft of encryption keys or MITM attack on clear text data in transit

284
Q

How can sensitive data exposure be prevented?

A

Avoid storing sensitive data (secure data)

285
Q

What is a crucial step to secure data in transit?

A

Encrypt data in transit

286
Q

What is a common wireless attack that involves unauthorized access?

A

Evil twin attack

287
Q

What traditional network security tool can mitigate ICMP ping flood attacks?

A

Firewall with ICMP filtering capabilities

288
Q

What is the primary reason attackers set up rogue access points?

A

To capture personal & financial information from unsuspecting users

289
Q

What should a library implement to secure its network after war chalking?

A

WPA2 or WPA3 wireless encryption

290
Q

What is the purpose of a Wireless Intrusion Prevention System (WIPS)?

A

To detect and prevent rogue access points

291
Q

What strategy can an e-commerce company use to mitigate DoS/DDoS attacks?

A

Monitor normal traffic patterns

292
Q

What access control model allows the owner of a resource to decide permissions?

A

DAC (Discretionary Access Control)

293
Q

What defines RBAC?

A

Permissions assigned based on role or job function

294
Q

What is RUBAC?

A

Rule-based access control; allowed or denied based on fixed rules

295
Q

What does ABAC stand for?

A

Attribute-based access control

296
Q

What is the goal of implementing strong encryption algorithms in the cloud?

A

To ensure that sensitive data is securely stored

297
Q

What is a key feature of multi-factor authentication?

A

Combines something you know and something you have

298
Q

What does the term ‘accounting’ refer to in the AAA framework?

A

Tracks what a user did & accessed

299
Q

What is the purpose of a security question in authentication?

A

Relies on something you know

300
Q

What access control method uses job function for permissions?

301
Q

What does PII stand for?

A

Personally Identifiable Information

302
Q

What does PIPEDA govern?

A

How private sector organizations collect, store, use & disclose personal information

303
Q

What is the focus of the GDPR?

A

Protection & privacy of personal information for individuals within the EU

304
Q

What does HIPAA primarily protect?

A

Health information

305
Q

What is the purpose of the PCI DSS?

A

To ensure security of credit & debit card transactions

306
Q

What does the Sarbanes-Oxley Act (SOX) set standards for?

A

Financial reporting to protect investors from fraudulent practices

307
Q

What is a key aspect of security governance?

A

Developing security policies & procedures

308
Q

What must organizations do under PIPEDA regarding personal information?

A

Establish adequate security measures for protection

309
Q

What should be included in an information security policy document?

A

Compliance requirements the sub-policy is designed to meet

310
Q

Fill in the blank: The weakest wireless security protocol is _______.

311
Q

True or False: WPA3 is the newest wireless security protocol.

312
Q

What does authorization determine in the AAA framework?

A

What can you do? What can you access?

313
Q

What type of access control is based on context or state of transaction?

A

CBAC (Context-Based Access Control)