Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

cybersec f2

QuestionAnswer
What principle protects information from unauthorized access? Group of answer choices confidentiality accounting nonrepudiation integrity confidentiality 1/1
What two approaches protect data secrecy? Group of answer choices authentication integrity nonrepudiation availability encryption authorization encryption authentication
How are data accuracy and consistency ensured? (Choose two) Group of answer choices privacy data consistency checks authorization repudiation hashing availability data consistency checks hashing
What three methods ensure system availability? Group of answer choices system resiliency integrity checking fire extinguishers up-to-date operating systems equipment maintenance system backups system backups up-to-date operating systems equipment 1
What term describes a secure, virtual network over public infrastructure? Group of answer choices NAC IDS Firewall MPLS IPS VPN vpn 1/1
What two approaches ensure system uptime? Group of answer choices integrity checking system backups system resiliency up-to-date operating systems equipment maintenance fire extinguishers equipment maintenance system backups ????
What three services does access control provide? Group of answer choices availability repudiation access authentication authorization accounting authentication authorization accounting 1/1
What three objectives does a thorough security policy achieve establishes guidelines for acceptable conduct provides management's endorsement and support for security measures useful for management vagueness outlines penalties for non-compliance establishes guidelines for acceptable conduct provides management's endorsement and support for security measures outlines penalties for non-compliance 1/1
What are two widely used hash functions? Group of answer choices MD5 RSA Blowfish SHA ECC RC4 MD5 SHA 1/1
How can organizations safeguard against unintended modifications by authorized personnel? Group of answer choices version control hashing backups SHA-1 encryption version control 1/1
What type of software profits from displaying intrusive pop-ups? Group of answer choices trackers pop-ups spyware adware adware 1/1
What are two common indicators of spam mail? The email has keywords in it The email has misspelled words or punctuation errors or both The email is from a friend The email is from your supervisor The email has no subject line. The email has misspelled words or punctuation errors or both The email has no subject line. 1/1
What does the term "logic bomb" refer to? Group of answer choices a malicious program that hides itself in a legitimate program a malicious worm a program that activates harmful code when triggered a malicious virus a program that activates harmful code when triggered 1/1
What does a rootkit alter? Group of answer choices operating system screen savers Microsoft Word Notepad programs operating system 1/1
What is the term for a targeted email scam against a financial institution's employee? Group of answer choices vishing target phishing spam spyware spear phishing spear phishing 1/1
What is the term for fraudulent emails posing as legitimate sources? Group of answer choices vishing phishing Trojan social engineering backdoor phishing 1/1
What are two weaknesses of the WEP protocol? Everyone on the network uses a different key WEP uses the same encryption features as Bluetooth The key is static and repeats on a congested network The key is transmitted in clear text The key is static and repeats on a congested network The key is transmitted in clear text 1/1
How do viruses and worms differ? Group of answer choices worms reproduce on their own, whereas viruses require a host. Worms require a host file but viruses do not Viruses hide in legitimate programs but worms do not worms reproduce on their own, whereas viruses require a host. 1/1
What is the term for code that evades normal authentication? Group of answer choices backdoor virus ransomware worm Trojan backdoor 1/1
What is the term for an attack exploiting SQL databases through user input fields? Group of answer choices XML injection Cross-site scripting SQL injection buffer overflow SQL injection 1/1
17.333
What term describes a storage device linked to a network? Group of answer choices SAN DAS Cloud RAID NAS NAS 1/1
What type of laws safeguard your sensitive information from being shared by organizations? Group of answer choices nonrepudiation confidentiality privacy authentication integrity privacy 1/1
What three objectives does a thorough security policy achieve? useful for management outlines penalties for non-compliance establishes guidelines for acceptable conduct provides management's endorsement and support for security measures outlines penalties for non-compliance establishes guidelines for acceptable conduct provides management's endorsement and support for security measures 1/1
What three design principles support high availability? protect data privacy validate data integrity implement redundant or backup systems identify failures in real-time ensure no critical component has only one point of failure implement redundant or backup systems identify failures in real-time ensure no critical component has only one point of failure 1/1
What are three types of sensitive information? Group of answer choices declassified public business published PII classified business PII classified 0.5 declassified PII classified ?? classified Pll
What are the cybersecurity triad's three core elements? Group of answer choices confidentiality integrity availability security encryption policy confidentiality integrity availability 1/1
What is the term for deceptive SMS messages that trick users into visiting malicious websites? Group of answer choices grayware impersonation smishing spam smishing 1/1
What happens when data exceeds a buffer's capacity? Group of answer choices a buffer overflow cross-site scripting an SQL injection a system exception a buffer overflow 1/1
What vulnerability enables script injection into users' web page views? Group of answer choices buffer overflow XML injection Cross-site scripting SQL injection Cross-site scripting 1/1
What does a rootkit alter? Group of answer choices programs screen savers operating system Microsoft Word Notepad operating system 1/1
18.5
What service controls user permissions and access levels? Group of answer choices authorization authentication accounting biometric token authorization 1/1
What term describes alterations to original data, including manual modifications, processing changes, and system failures? Group of answer choices dissemination corruption deletion modification integrity backup modification 1/1
What are two ways to protect a computer from malware? Group of answer choices Empty the browser cache Defragment the hard disk Delete unused software Keep software up to date Use antivirus software Keep software up to date Use antivirus software 1/1
What two tactics do social engineers use to deceive targets into revealing sensitive information? Group of answer choices intimidation urgency compassion integrity urgency intimidation 1/1
What type of attack involves intercepting data from nearby devices, as in the case of an attacker copying emails and contact lists outside a store? Group of answer choices bluejacking RF jamming bluesnarfing smishing bluesnarfing 1/1
19/20
What is a method of sending information from one device to another using removable media? sneaker net 1/1
What does the first dimension of the cybersecurity cube represent? goals 1/1
What is the term for software used to gather information about a user's computer without their consent? spyware 1/1
18
Created by: f3xo
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards