Security + Flashcards

1
Q

What is the CIA triangle?

A

Confidentiality, Integrity, Availability. Loss of one one can lead to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are causes of compromised security?

A

Technology weaknesses, Configuration weaknesses, Policy weaknesses, Human Error or malice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some of the biometric devices used?

A

Fingerprint scanner, hand geometry scanner, eye scanner (including retina and iris scanners), voice verification, signature verification, and DNA scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some Malware varieties?

A

Virus, Worm, Trojan horse, Logic bomb, Rootkit, Spyware, Adware, Keylogger, Botnet, Backdoor, Drive by download, zero day exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a virus?

A

A computer virus is a destructive application that is loaded on your computer. A virus is a program, not data, and you can only catch a virus by running a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the structure of a virus

A

Replication - viruses must propagate themselves. Payload - the malicious activity a virus performs when triggered. Payload trigger - The date or counter or circumstances present when a virus payload goes off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DoS?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DDoS?

A

Distributed denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name some examples of payload

A

Displaying messages, launching DDoS attack Erasing files randomly by type or usage, formatting hard drive, overwrite mainboard bios, sending email, expose private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is encryption?

A

Converting to unreadable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decryption

A

Converting back to readable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Algorithm

A

Procedure for encrypting or decrypting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cipher

A

Pair of encryption and decryption algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptography

A

Science of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

the activity of defrauding an online account holder of financial information by posing as a legitimate company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whaling

A

A type of fraud that targets high-profile end users

17
Q

Vishing

A

The act of using the telephone in an attempt to scam the user into surrendering private information

18
Q

Steganography

A

Hidden messages, often plain text, concealed in images etc.

19
Q

Hashes

A

Fixed length derivation of plaintext

20
Q

Three factors for authentication

A

biometrics, cac card, password (something you are, something you have, something you know)

21
Q

What is the biggest authentication vulnerability

A

Failed password attempts that don’t result in banning

22
Q

What are some authentication vulnerabilities

A

Short and insecure passwords, reusing passwords, saved passwords, protocol and algorithm deficiencies, failed attempts that dont result in banning

23
Q

How many anivirus and anti spyware programs should you have?

A

one antivirus, and as many anti spyware as you want

24
Q

Give an example of a two factor password

A

CAC followed by biometrics

25
Q

What is a trojan horse?

A

A backdoor installed into your computer so that it can be controlled

26
Q

What is a worm?

A

Like a virus, but it self replicates continuously until it eventually crashes your computer

27
Q

When updating BIOS, what do you not want to do?

A

Do not turn off computer

28
Q

What is a botnet?

A

a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge, e.g., to send spam messages

29
Q

Give some examples of physical access control

A

ID badges, proximity cards, smart cards, physical tokens, common access cards, biometrics

30
Q

What does social engineering mostly exploit?

A

Exploits trust between people

31
Q

What kind of malware is the most common?

A

Spyware (adware)