Security 6.1 Flashcards

1
Q

What technique would a hacker use to target the availability of network services?

A

Compromise hosts with bot malware to launch a coordinated attack that overwhelms a web service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Information is only revealed to authorized people

Think Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality Concerns

A

Snooping, Eavesdropping/wiretapping, Social Engineering, dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Snooping

A

this is any attempt to get access to information on a host or storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Eavesdropping/Wiretapping

A

snooping on data or telephone conversations as they pass over the network.

“tap” into a wire network or intercept unencrypted wireless transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social Engineering/Dumpster Diving

A

getting users to reveal information or finding printed information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Integrity

A

Data being stored and transferred has not been altered without authorization.

(Think Non-Repudiation/Hashing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Man in MIddle

A

hosts sits between 2 communicating nodes and captures comms and relays all communications between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Replay Attack

A

host captures another’s to some server and replays that response to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Availability Concerns

A

Keeping a service running so that authorized users can access and process data whenever necessary.

(Think ACCESS)

Ex. Denial or Service D.O.S., Power Outage, Hardware Failure, Destruction, Service Outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication

A

One or more methods of proving that a user is who they say they are

(Proving that you are who you say you are or what you claim to be)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non-repudiation

A

the assurance that someone cannot deny the validity of something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authorization

A

creating one or more barriers around the resource such that only authenticated users can gain access.

(permissions list that allows what users can do)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accounting

A

Recording when and by whom a resource was accessed.

(

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hashing

A

the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which action is an example of an appropriate redundancy measure?

A

Using a backup power generator in a hospital to provide electricity to critical life-support systems

17
Q

What technique can be used to prevent eavesdropping on a data network?

A

Encrypting data in-transit

18
Q

How do cyber criminals typically use wiretapping to steal information?

A

Using a hardware device that inserts the hacker between two hosts

19
Q

Which is an availability-related factor to consider when choosing a third-party cloud service provider?

A

Fault tolerance

20
Q

How can an administrator reduce the impact of hardware failures?

A

Provisioning redundant servers and configure a service to failover to a working server

21
Q

What action can help mitigate the risk of impersonation attacks?

A

Implementing strong identity controls, such as badging systems for building access and multi-factor authentication for network access

22
Q

impersonation attack

A

when a malicious actor assumes the identity of a legitimate party.

Ex.

23
Q

What action can help mitigate the risk of replay attacks?

A

Ensuring that applications use encryption and time-stamping to make certain that the tokens cannot be misused

24
Q

In which type of email-based social engineering attack does a person pretend to be someone else for the purpose of identity concealment by manipulating an IP address, MAC address, or email header?

A

Spoofing

25
Q

If someone claims to be receiving spam, what problem is occurring?

A

The person is receiving advertising or promotional schemes through instant messaging.