click below
click below
Normal Size Small Size show me how
IT Fundamentals
Block 5 Unit 1 - 20 April 2023
Question | Answer |
---|---|
A threat is any circumstance or event with the potential to adversely affect a system through unauthorized access, _______________, ______________, modification of ___________, or denial of ___________. | destruction, disclosure, modification of data, or denial of service |
Define Spoofing | Pretending to be something or someone other than yourself. |
Define Tampering | Modifying something on a disk, network, memory, or elsewhere. |
Define Repudiation | Claiming you didn't do something or were not responsible. |
Define Information disclosure | Providing information to someone not authorized to access it. |
Define Denial of service | Exhausting resources needed to provide service to the user. |
Define Elevation of privilege | Allowing someone to do something they are not authorized to do. |
What kind of threat has authorization to access a system but uses it in a way that is not approved by the party that granted authorization? _______________________________ | Inside Attack |
A __________ is an aggregation of compromised computers, turning them into __________ to be used by attackers. | Botnet, robots |
A ___________________ is a flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy. | Vulnerability |
Attackers may target one or multiple system resources. Name three. | 1. Data stored in an IS 2. Services provided to user 3. System processing power |
computer network attack is an _________________ act by which an __________________ threat attempts to evade security services and violate the security policy of a system. | intent, point of initiation, and method of delivery |
__________________________attacks occur when more requests are sent to a machine (host) than it can handle. | Denial of Service |
_________________ available in the underground community make DoS attacks an easy process. | Toolkits |
What type of attack involves multiple computers sending requests, usually performed through a botnet? _______________________________________________________________ | Distributed Denial of Service |
Some measures that can be done to reduce the risk of being stung by a DoS attack include what? ______________________________________________________________________________ | 1. Visible-to-the-world servers 2. Packet filtering 3. OS patches |
_______________ __________attacks allow access to some resources that your machine should not provide to the attacker. | Unauthorized Access |
Executing commands illicitly occurs when a/an _______________and ________________ person executes commands on a server. | unknown and untrusted |
The two types of destructive behavior are ____________________________ and ______________________________. | Data Diddling and Data Destruction |
The destructive behavior where the attacker changes entries in records is known as _____________________________. | Data Diddling |
The destructive behavior where the attacker deletes files is known as ______________________________. | Data Destruction |
Social engineering is a non-technical or low-technology confidence trick involving _______________ or fraud. | trickery |
_____________ ________________ involves psychological manipulation of people into divulging confidential information or performing other actions beneficial to an attacker. | social engineering |
The purpose of social engineering can be _______________________, _____________ or _____________________________. | information gathering, fraud, or system access |
___________________ techniques attempt to acquire sensitive data, such as bank account numbers, passwords, email accounts, etc. through fraudulent solicitations via email, text messages, websites. | Phishing |
5. ______________ phishing is a type of phishing that targets a specific individual, utilizing messaging that appeals to that person. | Spear Phishing |
_____________ is a specific form of spear phishing targeted at high-value targets. | Whaling |
_____________ leads a user to perform some action to trigger a trap, such as installing malware or leaving an infected flash drive in a public space? | Baiting |
Countermeasures against social engineering include what four techniques?__________________________________________________________________________________________________________________________________________________ | 1. Emails and attachments 2. Multifactor Authentication 3. Antivirus/malware, 4. Good Judgement |
Malicious code is or that is written to intentionally cause undesired effects, security breaches or damage to a system. | software or scripting |
_____is software designed to infiltrate or damage a computer system without the owner's informed consent. | Malware |
Malware's most common pathways from criminals to users is through what two methods? | email, and the world wide web |
Viruses are written by people with intent to do what? | to do harm |
Viruses are classified into two categories, based on how they propagate themselves: | Boot-sector virus, and File Infector Virus |
The first type, called a “boot-sector virus,” resides where? | in the first sector of a disk or Universal Serial Bus (USB) drive |
File infectors operate in memory and infect what kinds of files? | executable |
Worms can replicate themselves through specific , opening e-mail messages, and flash drives. They may not require user activation. | network protocols |
One of the most common methods of spreading a virus is through _____ services. | |
List four common symptoms of computer virus infection. | 1. Computer will not boot 2. Data is scrambled or corrupted 3. computer is erratic, 4. Partition is lost |
Routine results identifies hosts that are vulnerable to attacks. | scanning |
Patching is the process of repairing a _______ or a _______ that is identified after the release of an application or a software. | vulnerability or flaw |
This training informs users of common pitfalls that can cause system vulnerabilities and what they can do to mitigate them | User Awareness |
A ____ restricts data communication traffic to and from the network it’s connected to. | Firewall |
Anti- spyware prevents ______ from collecting information about the user. | spyware |
What device/service provides security, privacy and web filtering? | Proxy Servers/Web Content Filters |
A mail gateway can be set up to scan and filter out problematic _____, ______ and ______. | file extensions, viruses, and spam |
______determine whether or not someone attempted to break into a system, if they were successful, and what they may have done. | Detection measures |
_______software is your system’s protection against viruses. | Anti-Virus |
Anti-virus programs inspect the contents of each file, searching for specific patterns that match a malicious profile - called a ________. | Virus Signature |
An ________ detects suspicious activity on a host or a network, logs it, and alerts system or network administrators. | Intrusion Detection System |
Administrators should check what daily for signs of security compromise? | Monitor Logs |
Steps of the response phase of an attack may include items such as what? (name three) | 1. Define the attack 2. Inform users 3. Contain the intrusion |
Anyone in an organization responding to an incident should follow the organization’s ________. | SOP |
A _____________________ consists of an entity or multiple entities, such as governments, corporations or small businesses, coordinating to get a product or products to a final destination. | Supply Chain |
A third party in a supply chain is a ______________ or _______________ individual or company that provides a product or a ___________ in support of the primary objectives of an organization. | intermediary or subcontracted individual or company that provides a product or a service |
Granting either physical or virtual access to an organization’s information systems, software code or intellectual property can leave these vulnerable to what? | Vulnerable to exploitation through malicious actions or carelessness |
Ensuring the third party is _______________ data is an important prerequisite when considering cloud computing. | securing |
When ordering new hardware or software from a vendor, it is good cybersecurity practice to ask many ____________ prior to making any _______________. | questions prior to making any agreements |