Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Question

Which of the following methods is used to check the integrity of data?

Backup
Hashes or checksums
Encryption
Authentication
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Question

Which of the following statements describes cyberwarfare?
Remaining cards (52)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Summative 1

Introduction to Cybersecurity M1-M4

QuestionAnswer
Which of the following methods is used to check the integrity of data? Backup Hashes or checksums Encryption Authentication Hashes or checksums
Which of the following statements describes cyberwarfare? Cyberwarfare is an Internet-based conflict that involves the penetration of information systems of other nations
Which of the following methods can be used to ensure confidentiality of information? (Choose three correct answers) Data encryption Two-factor authentication Username ID and password
Which of the following pieces of information would be classified as personal data? (Select three correct answers) Social security number Driver license number Date and place of birth
Why might internal security threats cause greater damage to an organization than external security threats? Internal users have direct access to the infrastructure devices
Which of the following is a key motivation of a white hat attacker? Discovering weaknesses of networks and systems to improve the security level of these systems
An individual user profile on a social network site is an example of an ______ identity. Online Offline Online
Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems from harm. What level of cyber protection does each of the following factors require? Your online identity – Personal A customer database – Organizational Economic stabilty – Government
Your neighbor tells you that they don’t have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right? No
What are the foundational principles for protecting information systems as outlined in the McCumber Cube? (Choose three correct answers) Integrity Availability Confidentiality
Stuxnet malware was designed for which primary purpose? To cause physical damage to equipment controlled by computers
Which of the following examples illustrates how malware might be concealed? An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware
What is the purpose of a rootkit? To gain privileged access to a device while concealing itself
What type of attack allows an attacker to use a brute-force approach? Denial of service Packet sniffing Social engineering Password cracking Password Cracking
What is the most common goal of search engine optimization (SEO) poisoning? To increase web traffic to malicious sites
What do you call a program written to take advantage of a known security vulnerability? An exploit Antivirus A firewall A software update An exploit
Which of the following security vulnerabilities could result in the receipt of malicious information that could force a program to behave in an unintended way? Non-validated input
A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what? A hack A patch An install A fix A patch
What is a miner? A person that solves complex mathematical puzzles to verify a transaction
What is the primary goal of a DoS attack? To prevent the target server from being able to handle additional requests
Which of the following should be carried out to address known software vulnerabilities of a specific application? Install a security patch
Which of the following characteristics describe a worm? (Select two correct answers) Travels to new computers without any intervention or knowledge of the user Is self-replicating
Who is responsible for overseeing a blockchain electronic ledger? A central bank Anyone belonging to the blockchain network A government regulatory body A central blockchain authority Anyone belonging to the blockchain network
Securing physical access to target equipment is an organization’s best defense against a cyber attack.’ Is this true or false? True
Where is cryptocurrency stored? In a wallet On an exchange In a bank account On the blockchain In a wallet
You have stored your data on a local hard disk. Which method would secure this data from unauthorized access? Data encryption
How can you keep your personal browsing history hidden from other users on a shared computer? Operate the web browser in private browser mode
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer? Antispyware
Why do IoT devices pose a greater security risk than other computing devices on a network? Most IoT devices do not receive frequent software updates
What should you do in order to make sure that people you live with do not have access to your secure data? Set up password protection
Which of the following is an example of two factor authentication? Your fingerprint and your password
You're looking to print photos you saved on a cloud storage using third-party online printing service. After logging into it, you're automatically given access to the third-party printing service. What allowed this automatic authentication to occur? The cloud storage service is an approved application for the online printing service
You are having difficulty remembering passwords for all of your online accounts. What should you do? Save the passwords in a centralized password manager program
Which of the following is a requirement of a strong password? Use special characters such as ! @ or $
Which of the following passwords would most likely take the longest for an attacker to guess or break? mk$$cittykat104#
What is the best method to prevent Bluetooth from being exploited? Always disable Bluetooth when it is not being used
How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot? Connect with a VPN service
Which configuration on a wireless router is not considered to be adequate security for a wireless network? Preventing the broadcast of an SSID
Which technology removes direct equipment and maintenance costs from the user for data backups? cloud service
What is the only way of ensuring that deleted files on your computer are irrecoverable? Physically destroying your computer’s hard drive
What is the correct definition of risk management? The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities
Which of the following tools can be used to provide a list of open ports on network devices? Ping Tracert Nmap Whois NMap
Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks? Snort
‘Today, there are single security appliances that will solve all the network security needs of an organization.’ Is this statement true or false? False
What name is given to a device that controls or filters traffic going in or out of the network? Firewall
What tool can identify malicious traffic by comparing packet contents to known attack signatures? IDS
What protocol is used to collect information about traffic traversing a network? HTTPS NetFlow Telnet NAT Netflow
Behavior-based analysis involves using baseline information to detect what? Risk Anomalies Backdoors Vulnerabilities Anomalies
What is the last stage of a pen test? Scanning Analysis and reporting Gathering target information Maintaining access Analysis and Reporting
What is a security playbook? A collection of repeatable queries or reports that outline a standardized process for incident detection and response
What is the main aim of a Cyber Security Incident Response Team (CSIRT)? To help ensure organization, system and data preservation by performing investigations into computer security incidents
How do Cisco ISE and TrustSec work? They enforce access to network resources by creating role-based access control policies
The risk management process consists of four steps. Can you put these in the right order? 1. Frame the risk 2. Assess the risk 3. Respond to the risk 4. Monitor the risk
Created by: cinnamonbr34d
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards