Unit 1-2 Exam Flashcards
An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?
cracking
denial of service
rogue access point
spoofing
rogue access point
Configuring the cell phone to act as a wireless access point means that the cell phone is now a rogue access point. The employee unknowingly breached the security of the company network by allowing a user to access the network without connecting through the company access point. Cracking is the process of obtaining passwords from data stored or transmitted on a network. Denial of service attacks refer to sending large amounts of data to a networked device, such as a server, to prevent legitimate access to the server. Spoofing refers to access gained to a network or data by an attacker appearing to be a legitimate network device or user.
What websites should a user avoid when connecting to a free and open wireless hotspot?
websites to check product details
websites to make purchases
websites to check stock prices
websites to check account fees
websites to make purchases
Answers Explanation & Hints:
Many free and open wireless hotspots operate with no authentication or weak authentication mechanisms. Attackers could easily capture the network traffic in and out of such a hotspot and steal user information. Therefore, users who use free and open wireless hotspots to connect to websites should avoid giving any personal information to the websites.
A user calls the help desk complaining that the password to access the wireless network has changed without warning. The user is allowed to change the password, but an hour later, the same thing occurs. What might be happening in this situation?
rogue access point password policy user error user laptop weak password
rogue access point
Answers Explanation & Hints:
Man-in-the-middle attacks are a threat that results in lost credentials and data. These type of attacks can occur for different reasons including traffic sniffing.
What type of cyberwarfare weapon was Stuxnet?
worm
virus
ransomware
botnet
worm
Answers Explanation & Hints:
The Stuxnet worm was an excellent example of a sophisticated cyberwarfare weapon. In 2010, it was used to attack programmable logic controllers that operated uranium enrichment centrifuges in Iran.
When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?
adware
ransomware
spyware
Trojan
ransomware
Answers Explanation & Hints:
Ransomware requires payment for access to the computer or files. Bitcoin is a type of digital currency that does not go through a particular bank.
Why do IoT devices pose a greater risk than other computing devices on a network?
Most IoT devices do not require an Internet connection and are unable to receive new updates.
IoT devices require unencrypted wireless connections.
IoT devices cannot function on an isolated network with only an Internet connection.
Most IoT devices do not receive frequent firmware updates.
Most IoT devices do not receive frequent firmware updates.
Answers Explanation & Hints:
IoT devices commonly operate using their original firmware and do not receive updates as frequently as laptops, desktops, and mobile platforms.
Which cyber attack involves a coordinated attack from a botnet of zombie computers?
DDoS
MITM
ICMP redirect
address spoofing
DDoS
Answers Explanation & Hints:
DDoS is a distributed denial-of-services attack. A DDoS attack is launched from multiple coordinated sources. The sources of the attack are zombie hosts that the cybercriminal has built into a botnet. When ready, the cybercriminal instructs the botnet of zombies to attack the chosen target.
A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?
botnet
rootkit
spyware
virus
botnet
Answers Explanation & Hints:
A botnet is a network of infected computers called a zombie network. The computers are controlled by a hacker and are used to attack other computers or to steal data.
A company has just had a cybersecurity incident. The threat actor appeared to have a goal of network disruption and appeared to use a common security hack tool that overwhelmed a particular server with a large amount of traffic. This traffic rendered the server inoperable. How would a certified cybersecurity analyst classify this type of threat actor?
amateur
state-sponsored
terrorist
hacktivist
amateur
Answers Explanation & Hints:
Amateurs or script kiddies use common, existing tools found on the internet to launch attacks. Hacktivists disrupt services in protest against organizations or governments for a particular political or social idea. State-sponsored threat actors use cyberspace for industrial espionage or interfering with another country in some way. Terrorist groups attack for a specific cause.
In a smart home, an owner has connected many home devices to the Internet, such as the refrigerator and the coffee maker. The owner is concerned that these devices will make the wireless network vulnerable to attacks. What action could be taken to address this issue?
Disable the SSID broadcast.
Install the latest firmware versions for the devices.
Configure mixed mode wireless operation.
Assign static IP addresses to the wireless devices.
Install the latest firmware versions for the devices.
Answers Explanation & Hints:
The Internet of Things (IoT) is facilitating the connection of different kinds of devices to the internet, like home devices such as coffee makers and refrigerators, and also wearable devices. In order to make these devices secure and not vulnerable to attacks, they have to be updated with the latest firmware.
Which statement describes cyberwarfare?
Cyberwarfare is an attack carried out by a group of script kiddies.
It is simulation software for Air Force pilots that allows them to practice under a simulated war scenario.
It is a series of personal protective equipment developed for soldiers involved in nuclear war.
It is Internet-based conflict that involves the penetration of information systems of other nations.
It is Internet-based conflict that involves the penetration of information systems of other nations.
Answers Explanation & Hints:
Cyberwarfare is Internet-based conflict that involves the penetration of the networks and computer systems of other nations. Organized hackers are typically involved in such an attack.
What is the main purpose of cyberwarfare?
to protect cloud-based data centers
to gain advantage over adversaries
to develop advanced network devices
to simulate possible war scenarios among nations
to gain advantage over adversaries
Answers Explanation & Hints:
Cyberwarfare is Internet-based conflict that involves the penetration of the networks and computer systems of other nations. The main purpose of cyberwarfare is to gain advantage over adversaries, whether they are nations or competitors.
What are two examples of personally identifiable information (PII)? (Choose two.)
credit card number first name street address language preference IP address
credit card number
street address
Answers Explanation & Hints:
Personally identifiable information (PII) is any data that could potentially identify and track a specific individual. A credit card number and street address are the best examples of PII.
Which regulatory law regulates the identification, storage, and transmission of patient personal healthcare information?
GLBA
HIPAA
FISMA
PCI-DSS
HIPAA
Answers Explanation & Hints:
The Health Insurance Portability and Accountability Act (HIPAA) requires that all patient personally identifiable healthcare information be stored, maintained, and transmitted in ways that ensure patient privacy and confidentiality.
A worker in the records department of a hospital accidentally sends a medical record of a patient to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. What breach of confidentiality does this situation describe?
PSI
PHI
PII
EMR
PHI
Answers Explanation & Hints:
Protected Health Information (PHI) includes patient name, addresses, visiting dates and more. The Health Insurance Portability and Accountability Act (HIPAA) regulates and provides severe penalties for breaches of PHI. EMRs (Electronic Medical Records) are documents created and maintained by the medical community that contain PHI. Personally identifiable information (PII) is any information that can be used to positively identify an individual, such as name and social security number. Personal Security Information (PSI) is related to information about an individual such as passwords, access keys, and account details.