Topic 1: Network and security basics Flashcards
In information security, what are the three main goals? (Select the three best answers.)
A. Auditing
B. Integrity
C. Non-repudiation
D. Confidentiality
E. Risk Assessment
F. Availability
B, D, and F. Confidentiality, integrity, and availability (known as CIA, the CIA triad, and the security triangle) are the three main goals when it comes to information security. Another goal within information security is accountability.
To protect against malicious attacks, what should you think like?
A. Hacker
B. Network admin
C. Spoofer
D. Auditor
A. To protect against malicious attacks, think like a hacker. Then, protect and secure like a network security administrator.
Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails?
A. Authenticity
B. Non-repudiation
C. Confidentiality
D. Integrity
B. You should use non-repudiation to prevent Tom from denying that he sent the e-mails.
Which of the following does the A in CIA stand for when it comes to IT security? (Select the best answer.)
A. Accountability
B. Assessment
C. Availability
D. Auditing
C. Availability is what the A in CIA stands for, as in “the availability of data.” Together the acronym stands for confidentiality, integrity, and availability. Although accountability is important and is often included as a fourth component of the CIA triad, it is not the best answer. Assessment and auditing are both important concepts when checking for vulnerabilities and reviewing and logging, but they are not considered to be part of the CIA triad.
Which of the following is the greatest risk when it comes to removable storage?
A. Integrity of data
B. Availability of data
C. Confidentiality of data
D. Accountability of data
C. For removable storage, the confidentiality of data is the greatest risk because removable storage can easily be removed from the building and shared with others. Although the other factors of the CIA triad are important, any theft of removable storage can destroy the confidentiality of data, and that makes it the greatest risk.
When it comes to information security, what is the I in CIA?
A. Insurrection
B. Information
C. Indigestion
D. Integrity
D. The I in CIA stands for integrity. The acronym CIA stands for confidentiality, integrity, and availability. Accountability is also a core principle of information security.
You are developing a security plan for your organization. Which of the following is an example of a physical control?
A. Password
B. DRP
C. ID card
D. Encryption
C. An ID card is an example of a physical security control. Passwords and encryption are examples of technical controls. A disaster recovery plan (DRP) is an example of an administrative control.
A user receives an e-mail but the e-mail client software says that the digital signature is invalid and the sender of the e-mail cannot be verified. The would-be recipient is concerned about which of the following concepts?
A. Confidentiality
B. Integrity
C. Remediation
D. Availability
B. The recipient should be concerned about the integrity of the message. If the e-mail client application cannot verify the digital signature of the sender of the e-mail, then there is a chance that the e-mail either was intercepted or is coming from a separate dangerous source. Remember, integrity means the reliability of the data, and whether or not it has been modified or compromised by a third party before arriving at its final destination.
Cloud environments often reuse the same physical hardware (such as hard drives) for multiple customers. These hard drives are used and reused when customer virtual machines are created and deleted over time. What security concern does this bring up implications for?
A. Availability of virtual machines
B. Integrity of data
C. Data confidentiality
D. Hardware integrity
C. There is a concern about data confidentiality with cloud computing because multiple customers are sharing physical hard drive space. A good portion of customers run their cloud-based systems in virtual machines. Some virtual machines could run on the very same hard drive (or very same array of hard drives). If one of the customers had the notion, he could attempt to break through the barriers between virtual machines, which if not secured properly, would not be very difficult to do.
Which of the following individuals uses code with little knowledge of how it works?
A. Hacktivist
B. Script kiddie
C. APT
D. Insider
B. A script kiddie uses code and probably doesn’t understand how it works and what the repercussions will be. Other actors such as hackers, hacktivists, insiders, and so on will usually have a higher level of sophistication when it comes to technology. An advanced persistent threat (APT) is a group of technical processes or the entity that implements those processes. An APT is just that—advanced—and is on the other side of the spectrum from the script kiddie.
When is a system completely secure?
A. When it is updated
B. When it is assessed for vulnerabilities
C. When all anomalies have been removed
D. Never
D. A system can never truly be completely secure. The scales are always tipping back and forth; a hacker develops a way to break into a system, then an administrator finds a way to block that attack, and then the hacker looks for an alternative method. It goes on and on; be ready to wage the eternal battle!
____________ is relatively low speed, has a global scale and reach, administration is decentralised and dispersed with a reduced level of security and lowest level of trust.
Internet
____________ is usually private and owned by an organisation, usually high speed architecture and can include WAN components in this context, with a mostly centralised administration, elevated level of security and highest level of trust.
Intranet
________________ is usually private and owned by an external organisation, it often has high speed architecture and can include WAN or VPN components, with mostly centralised administration, elevated level of security and Mid/High level of trust.
Extranet
___________ is usually private and owned by an organisation, it often has high speed architecture and can include components of any network architecture, with mostly centralised administration, restricted level of security, mid level of trust and provides “landing pad” for external parties, while protecting internal networks.
DMZ
The Session layer protocols include? (choose three):
NFS
PICT
X Windows
SQL
TCP
NFS
X Windows
SQL
Which layer is responsible for finding a communication partner on the network?
Application
Transport
Data Link
Physical
Data Link
If your network diagnostic tool identifies a problem with the logical addressing, what layer of the OSI model would you be troubleshooting?
Network
Physical
Transport
Data Link
Network
The Presentation layer protocols include? (choose two)
PICT
TCP
IPX
JPEG
SQL
PICT
JPEG
Which of the following are performed at the Presentation layer? (Choose two):
Setting checkpoints in the data stream for reliability
Adding the network addresses to the header
Providing character conversion between dissimilar operating systems (such as PC to mainframe)
Presenting data to the Application layer
Providing character conversion between dissimilar operating systems (such as PC to mainframe)
Presenting data to the Application layer
Which layer is responsible for multiplexing data from upper layers and placing the data into a segment?
Network
Physical
Data Link
Transport
Transport
The function of the Session layer is? (choose two):
To present data to the Network layer
To provide flow control
To place checkpoints into the data stream for reliability
To determine if half-duplex or full-duplex is being used
To place checkpoints into the data stream for reliability
To determine if half-duplex or full-duplex is being used
The Transport layer can communicate directly with the Network and Presentation layers.
True
False
False
Application
Presentation
Session
Transport
Network
Data Link
Physical
The Network layer’s primary function is to:
Establish a communication path to the communication partner
Add MAC addresses to the packet
Provide connection-oriented service
Route data between different network segments
Route data between different network segments
Known as malware, this includes computer viruses, worms, Trojan horses, spyware, rootkits, adware, ransomware, crypto-malware, and other types of unwanted software. Everyone has heard of a scenario in which a user’s computer was compromised to some extent due to malicious software:
- System failure
- Social engineering
- Unauthorised access
- Malicious software
Malicious software
Access to computer resources and data without consent of the owner. It might include approaching the system, trespassing, communicating, storing and retrieving data, intercepting data, or any other methods that would interfere with a computer’s normal work. Access to data must be controlled to ensure privacy. Improper administrative access falls into this category as well:
- Social engineering
- Malicious software
- Unauthorised access
- System failure
Unauthorised access
Computer crashes or individual application failure. This can happen due to several reasons, including user error, malicious activity, or hardware failure:
- Social engineering
- System failure
- Unauthorised access
- Malicious software
System failure
The act of manipulating users into revealing confidential information or performing other actions detrimental to the users. An example would be receiving e-mails from unknown entities making false claims or asking for personal information:
- Unauthorised access
- System failure
- Malicious software
- Social engineering
Social engineering
The three primary concepts cybersecurity needs to protect are:
- confidentiality, disclosure, availability
- disclosure, alteration, denial
- confidentiality, integrity, availability
- continuity, integrity, availability
confidentiality, integrity, availability
Which one of the following is a possible technology weakness?
- insufficient RAM
- tailgating
- default password
- poorly written DR policy
insufficient RAM
Which layer of the OSI model do routers work at?
internet
data link
transport
network
network
Which of the following traffic types allows users to “tune into” different types of traffic?
- anycast
- unicast
- multicast
- broadcast
multicast
A group of compromised computers that have software installed by a worm or Trojan is known as which of the following?
A. Botnet
B. Virus
C. Rootkit
D. Zombie
A. A botnet is a group of compromised computers, usually working together, with malware that was installed by a worm or a Trojan horse. An individual computer within a botnet is referred to as a zombie (among other things). A virus is code that can infect a computer’s files. A rootkit is a type of software designed to gain administrator-level access to a system.
Which of the following computer security threats can be updated automatically and remotely? (Select the best answer.)
A. Virus
B. Worm
C. Zombie
D. Malware
C. Zombies (also known as zombie computers) are systems that have been compromised without the knowledge of the owner. A prerequisite is the computer must be connected to the Internet so that the hacker or malicious attack can make its way to the computer and be controlled remotely. Multiple zombies working in concert often form a botnet. See the section “Delivery of Malware” earlier in this chapter for more information.
You have been given the task of scanning for viruses on a PC. What is the best of the following methods?
A. Recovery environment
B. Dual-boot into Linux
C. Command Prompt only
D. Boot into Windows normally
A. You should use a recovery environment. Most often, this would be the one built into Windows. Many manufacturers suggest using this, and more specifically Safe Mode. However, it could also be a Linux rescue disc or flash drive. That’s not a true dual-boot though. An actual dual-boot is when Windows and Linux are both installed to the hard drive. Command Prompt only is not enough, nor is it necessary for some virus scanning scenarios. Booting into Windows normally is tantamount to doing nothing. Remember to use a recovery environment when scanning for viruses.
Which of the following is a common symptom of spyware?
A. Infected files
B. Computer shuts down
C. Applications freeze
D. Pop-up windows
D. Pop-up windows are common to spyware. The rest of the answers are more common symptoms of viruses.
Dan is a network administrator. One day he notices that his DHCP server is flooded with information. He analyzes it and finds that the information is coming from more than 50 computers on the network. Which of the following is the most likely reason?
A. Virus
B. Worm
C. Zombie
D. PHP script
B. A worm is most likely the reason that the server is being bombarded with information by the clients; perhaps it is perpetuated by a botnet. Because worms self-replicate, the damage can quickly become critical.
Which of the following is not an example of malicious software?
A. Rootkits
B. Spyware
C. Viruses
D. Browser
D. A web browser (for example, Internet Explorer) is the only one listed that is not an example of malicious software. Although a browser can be compromised in a variety of ways by malicious software, the application itself is not the malware.