40 Questions
What type of attack involves overloading a machine or bandwidth by flooding it with random requests?
DDOS using a botnet
Which method involves an attacker impersonating a trustworthy source to get individuals to disclose personal information?
Pretexting
How is privilege escalation defined?
Entering a system using end-user privileges
Which countermeasure involves shield network services from attacks and uses packet filtering based on rules set up in the firewall?
Firewalls
What is the purpose of using multifactor authentication?
To require multiple items for verification such as userID, password, memorable info or physical key
Which method involves using encryption for data transfer in login portals and tunneling through the internet using VPNs?
Secure Networking
What is the purpose of message digests in the context of security?
To proof no tampering in transit
What does intrusion detection involve?
Logging packets for forensics
What is the purpose of formal verification in the context of security?
To use secure O/S or hypervisor with a secure installer or service layer
Why is redirecting web access to fake login page associated with Trojans, viruses, and worms?
To steal another person’s identity.
What is the main concern with the increasing amount of online information?
Security issues leading to potential threats
What is the purpose of assets in the context of security?
To quantify the risk and identify protection efforts
What are vulnerabilities in the context of security?
Weaknesses that make attacks on information possible
What is the estimated impact of a successful attack on assets?
Estimated loss
What is the main concern with backdoors in software?
Secret routes into software left by developers
What is the definition of countermeasures in the context of security?
Prevention and mitigation tactics
What do vulnerabilities like eavesdropping involve?
Sniffing traffic going through routers
What are threats in the context of security?
Potential dangers to assets
What is the significance of maximum security with minimum productivity impact in security terminology?
Balancing security with minimal impact on productivity
What is the purpose of direct access vulnerabilities?
Left/Lost disks and flash drives or unsecured networks laptops
What is the primary purpose of assets in the context of security?
To identify what you want to protect and their value
What is the main concern with the increasing amount of online information?
Potential dangers to valuable assets
How are vulnerabilities defined in the context of security?
Weaknesses that make attacks on information possible
What do countermeasures involve in the context of security?
Shielding network services from attacks and using packet filtering based on firewall rules
What is the significance of maximum security with minimum productivity impact in security terminology?
It emphasizes balancing security with minimal disruption to work
What is the purpose of formal verification in the context of security?
To verify that a system meets its specification
Which type of attack involves overloading a machine or bandwidth by flooding it with random requests?
Denial of service (DoS)
What is the main concern with backdoors in software?
Secret routes into software left by developers – later exploited
What is the purpose of direct access vulnerabilities?
Left/lost disks and flash drives or unsecured networks laptops
What does the term 'spoofing' typically involve in the context of cybersecurity?
Impersonating a trustworthy source to deceive individuals
What is the definition of countermeasures in the context of security?
Prevention and mitigation tactics
Which method aims to shield network services from attacks and uses packet filtering based on predefined rules in the firewall?
Firewalls
What is the main purpose of using multifactor authentication in the context of security?
To require multiple items for user verification
What is the main concern with the use of clickjacking in cybersecurity?
Redirecting web access to fake login pages
What does the term 'denial-of-service' refer to in the context of cybersecurity?
Overloading a machine or bandwidth by flooding it with random requests
What is the purpose of using message digests in the context of security?
To ensure no tampering of data during transit
Which method involves physically separating computers with no internet access and using a Faraday cage to block electromagnetic waves?
Physical Separation
What is the main aim of intrusion detection in cybersecurity?
Logging packets for forensic analysis
'Phishing' in cybersecurity typically involves:
'Spoofing' by impersonating a trustworthy source
'Pretexting' in cybersecurity involves:
'Spoofing' by impersonating a trustworthy source
Test your knowledge about the increasing significance of online information, its benefits, and the potential security issues. Explore the impact of online information on e-commerce, connected health, and social networking.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free