Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

SA 1 - IT0201

Introduction to Cybersecurity

QuestionAnswer
A cybercriminal sends a series of maliciously formatted packets to a database server, which causes the server to crash. What do you call this type of attack? SQL injection DoS Man-in-the-middle Packet injection Dos
Employees in an organization report that the network access is slow. Further investigation reveals that one employee downloaded a third-party scanning program for the printer. What type of malware may have been introduced? Worm
A penetration test carried out by an organization identified a backdoor on the network. What action should the organization take to find out if their systems have been compromised? Look for unauthorized accounts
All employees in an organization receive an email stating that their account password will expire immediately and that they should reset their password within five minutes. Which of the following statements best describes this email? It is a hoax
What do you call an impersonation attack that takes advantage of a trusted relationship between two systems? Man-in-the-middle Sniffing Spamming Spoofing Spoofing
Which best practices can help defend against social engineering attacks? (Choose three.) Educate employees regarding security policies Resist the urge to click on enticing web links Do not provide password resets in a chat window
What non-technical method could a cybercriminal use to gather sensitive information from an organization? Pharming Man-in-the-middle Social engineering Ransomware Social engineering
Employees in an organization report that they can't access the customer database. The database file is now encrypted. They received a threatening email demanding payment. What type of attack has the organization experienced? Ransomware
Which of the following statements describes a distributed denial of service (DDoS) attack? A botnet of zombies, coordinated by an attacker, overwhelms a server with DoS attacks
What type of attack occurs when data goes beyond the memory areas allocated to an application? RAM spoofing SQL injection RAM injection Buffer overflow Buffer Overflow
What name is given to any changes made to original data, such as data being modified manually? (Select two answers) Backup Modification
Which of the following methods help to ensure data integrity? (Select two answers) Hashing Data consistency checks
What name is given to a storage device connected to a network? RAID DAS NAS SAN NAS
Which of the following methods help to ensure system availability? (Select two answers) Updating operating systems Equipment maintenance
What is an advantage of using a hashing function? It is a one-way function and not reversible
What is the name of the method in which letters are rearranged to create a ciphertext? Substitution Transposition One-time pad Enigma Transposition
Which of these protocols use asymmetric key algorithms? (Select three answers) Secure Sockets Layer (SSL) Secure Shell (SSH) Pretty Good Privacy (PGP)
@Apollo has created a new program and wants to distribute it to everyone in the organization. They want to ensure that when the program is downloaded, it is not changed while in transit. What can @Apollo do to ensure this does not happen? Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded
What term is used to describe concealing data in another file such as a graphic, audio or video file? Steganography Hiding Masking Obfuscation Steganography
Which of the following are examples of administrative access controls? (Select three answers) Policies and procedures Background checks Hiring practices
You are setting up a wireless network. What technology should you set up on the network to prevent man-in-the-middle attacks? Mutual authentication
What type of lock is recommended to secure an office door? Cipher lock Keyed entry lock Security cage Cable lock Cipher lock
What can you do to ensure that network operating software remains secure? (Choose three.) Install patches and updates regularly Conduct software testing prior to launch Develop a policy to address application software and operating system updates
What is a demilitarized zone (DMZ)? A small network between a trusted private network and the Internet
Which type of technology can prevent malicious software from displaying unwanted popup ads on a device? Adware protection
What would you set up to divide a computer network into smaller parts with the aim of improving network performance and security? A VLAN
Which of the following enables secure contactless payment? USB communication Infrared (IR) Near-field communication (NFC) Near-field communication (NFC)
What feature does Microsoft Windows use for full disk encryption (FDE)? Trusted Platform Module (TPM) BitLocker To Go Measured Boot BitLocker BitLocker
What can be used to ensure that a piece of software you are installing is authentic? Code signing Secure cookies Validation rules A checksum Code signing
You want to keep unauthorized users and devices out of a private network. What solution would you use? Network Access Control (NAC)
What technique can a developer use to prevent software from being reverse engineered by a hacker? Obfuscation
Remote-access VPNs allow mobile workers to access the corporate network using a VPN client installed on their device.’ Is this statement true or false? True
You want to install a system on the network to monitor traffic and immediately respond to any threats identified. Which of the following should you use? An Intrusion Prevention System (IPS)
Which environment should be used by developers to verify that software runs under the required security settings? Staging environment
What type of side-channel attacks do cybercriminals launch by studying how long it takes an embedded system to respond to different inputs? Timing attacks
What should you do to prevent attacks on SCADA systems? Segregate internal and external networks
What do organizations use deception technologies for? (Choose three correct answers) To learn an attacker’s methods To warn of potential attacks that could be launched To distract attackers from production networks
You want to use deception technology to push users away from malicious URLs. Which of the following should you use? A DNS sinkhole
What occurs when too many virtualized, underutilized servers use up more resources and space than needed for the work they are doing? VM sprawl
What key component of virtualization allows you to run multiple independent operating systems on one physical system? A hypervisor
What is geofencing used for? To trigger an action when a user enters or exits a geographic boundary
What protocol should be used when simple username/password authentication is needed? 802.1x TACACS+ CHAP RADIUS RADIUS
What algorithm is used by governments to create digital signatures? Hint: It uses large number factorization. DSA
Is the following statement true or false? ‘A digital certificate authenticates and verifies that a user sending a message is who they claim to be.’ True
@Apollo is running a routine audit of the server hardware in the company data center. Several servers are using single drives to host operating systems and multiple types of attached storage solutions for storing data. Which solution is best? RAID
@Apollo is evaluating its data center to improve availability. The technicians notice that there's only 1 router, some equipment is out of warranty, there are no spare parts. Which deficiencies in high availability has identified? (Select three answers) Failure to detect errors as they occur Failure to design for reliability Single points of failure
Apollo is purchasing a new server for the company data center. The user wants to most efficiently utilize the capacity of three disks with redundancy. Which RAID level should the user implement? 5
Which industries should be required to maintain five nines availability? (Select three answers) Healthcare Public safety Finance
You have been asked to perform an analysis of the current state of an organization’s network. What would you use to scan the network only for security risks? Vulnerability scanner
@Apollo is evaluating its network infrastructure. They've noted that redundant systems and devices are in place. A report emphasized the methods needed to make the network fault tolerant. What is the type of design @Apollo is advocating for? Resilient
Which of the following types of power issues should a technician be concerned about? (Select three correct answers) Blackout Brownout Spike
Which of the following devices represent examples of physical access controls? (Select three correct answers) Locks Video cameras Swipe cards
What design principles help to ensure high availability? (Select three answers) Eliminating single points of failure Providing for reliable crossover Detecting failures as they occur
An organization is looking to implement biometric access to its data center but is concerned that people may be able to circumvent the system by being falsely accepted as legitimate users. What type of error is such false acceptance? Type II
Which of the following firewalls hides or masquerades the private addresses of network hosts? Network address translation firewall
Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what? Advanced persistent threat
You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration? Confidentiality
What are the objectives of ensuring data integrity? (Choose two correct answers) Data is unaltered during transit Data is not changed by unauthorized entities
An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan? Availability
What of the following are examples of cracking an encrypted password? (Choose four correct answers) Brute force attack Rainbow tables Spraying Dictionary attack
Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability? Access control problems
A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email? Patient records
What is the best way to avoid getting spyware on a machine? Install software only from trusted websites
You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network? If the laptop requires user authentication for file and media sharing
What is the main function of the Cisco Security Incident Response Team? To ensure company, system and data preservation
Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers? Reverse proxy server
Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government? CompTIA Security+
One of your colleagues has lost her ID badge. She's in a hurry to get to a meeting and doesn't have time to visit Human Resources to get temporary badge. You lend her your ID badge until she obtain a replacement. Is this behavior ethical or unethical? Unethical
Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner? EC Council Certified Ethical Hacker
What is the main purpose of cyberwarfare? To gain advantage over adversaries
What vulnerability occurs when the output of an event depends on ordered or timed outputs? Race conditions
What do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995? (Select two correct answers) Spectre Meltdown
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities? Weaknesses in security practices
Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website? Open authorization
Which of the following security implementations use biometrics? (Choose two correct answers) Fingerprint Voice Recognition
Which of the following firewalls filters traffic based on source and destination IP addresses? Network layer firewall
Which of the following firewalls filters web content requests such as URLs and domain names? Proxy server
A port scan returns a ‘dropped’ response. What does this mean? There was no reply from the host
During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee’s behavior ethical or unethical? Ethical
Created by: cinnamonbr34d
Popular Standardized Tests sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards