click below
click below
Normal Size Small Size show me how
Intro to cyber F2
| Question | Answer |
|---|---|
| What principle protects information from unauthorized access? | confidentiality |
| What term describes a secure, virtual network over public infrastructure? | VPN |
| What are the three states of data? | at rest in-process in-transit |
| What three design principles support high availability? | Identify failures in real-time Ensure no critical component has only one point of failure Implement redundant or backup systems |
| What term describes alterations to original data, including manual modifications, processing changes, and system failures? | modification |
| What three methods ensure system availability? | up-to-date operating systems equipment maintenance system backups |
| What does the first dimension of the cybersecurity cube represent? | goals |
| How are data accuracy and consistency ensured? (Choose two) | hashing data consistency checks |
| What two approaches protect data secrecy? | authentication encryption |
| What three objectives does a thorough security policy achieve? | - provides management's endorsement and support for security measures - outlines penalties for non-compliance - establishes guidelines for acceptable conduct |
| What is the term for deceptive SMS messages that trick users into visiting malicious websites? | smishing |
| What does the term "logic bomb" refer to? | a program that activates harmful code when triggered |
| What are two weaknesses of the WEP protocol? | The key is transmitted in clear text The key is static and repeats on a congested network |
| What type of attack involves intercepting data from nearby devices, as in the case of an attacker copying emails and contact lists outside a store? | bluesnarfing |
| What does a rootkit alter? | operating system |
| What is the term for a targeted email scam against a financial institution's employee? | spear phishing |
| What is the term for fraudulent emails posing as legitimate sources? | phishing |
| What two tactics do social engineers use to deceive targets into revealing sensitive information? | urgency intimidation |
| What is the term for code that evades normal authentication? | backdoor |
| What is the term for an attack exploiting SQL databases through user input fields? | SQL injection |
| What two approaches ensure system uptime? | up-to-date operating systems equipment maintenance |
| What term describes a storage device linked to a network? | NAS |
| What type of laws safeguard your sensitive information from being shared by organizations? | privacy |
| What type of malware demands payment in exchange for restoring access to user data? | ransomware |
| How do viruses and worms differ? | worms reproduce on their own, whereas viruses require a host. |
| What are the cybersecurity triad's three core elements? | confidentiality integrity availability |
| What are three types of sensitive information? *** | classified business PII (Personally Identifiable Information) ---------------------- PII classified declassified ------------------------- business pii declassified |
| What service controls user permissions and access levels? | authorization |
| How can organizations safeguard against unintended modifications by authorized personnel? | version control |
| What is the term for software used to gather information about a user's computer without their consent? | spyware |
| What three methods confirm identity for authentication purposes? | something you know something you have something you are |
| What is a method of sending information from one device to another using removable media? | sneaker net |
| What type of software profits from displaying intrusive pop-ups? | adware |
| What vulnerability enables script injection into users' web page views? | Cross-site scripting |
| What are two widely used hash functions? | MD5 SHA |
| What are two common indicators of spam mail? | The email has no subject line. The email has misspelled words or punctuation errors or both |
| What three services does access control provide? | Accounting authentication authorization |
| What are two ways to protect a computer from malware? | Use antivirus software Keep software up to date |
| What happens when data exceeds a buffer's capacity? | a buffer overflow |
| What are two common indicators of spam mail? | The email has no subject line. The email has misspelled words or punctuation errors or both |
| What three services does access control provide? | Accounting authentication authorization |
| What are two ways to protect a computer from malware? | Use antivirus software Keep software up to date |
| What happens when data exceeds a buffer's capacity? | a buffer overflow |