Untitled Quiz
53 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does increasing sensitivity in biometric systems potentially lead to?

  • A decrease in the False Acceptance Rate (FAR)
  • A lower Crossover Error Rate (CER)
  • Improved user experience in authentication
  • An increase in the False Rejection Rate (FRR) (correct)
  • What is the primary purpose of using multiple factors in electronic door locks?

  • To enhance security (correct)
  • To reduce user errors during access
  • To simplify the authentication process
  • To increase the time for user access
  • What is the defining characteristic of cipher locks?

  • They require a correct combination of numbered push buttons (correct)
  • They use biometric authentication methods
  • They utilize RFID technology for access control
  • They operate solely without any moving parts
  • What is Access Badge Cloning primarily associated with?

    <p>Copying data from RFID or NFC cards (A)</p> Signup and view all the answers

    Which of the following technologies is commonly used for contactless authentication?

    <p>Near Field Communication (NFC) (A)</p> Signup and view all the answers

    What is a key action you should take if infected by ransomware?

    <p>Disconnect the infected machine from the network (B)</p> Signup and view all the answers

    Which of the following best defines a botnet?

    <p>A network of compromised devices controlled by an attacker (C)</p> Signup and view all the answers

    What is the role of a 'Zombie' in cybersecurity terminology?

    <p>A compromised device used for remote commands (D)</p> Signup and view all the answers

    Why is it advised not to pay a ransom in a ransomware attack?

    <p>Paying does not ensure data recovery (A)</p> Signup and view all the answers

    Which security measure is NOT typically recommended against ransomware attacks?

    <p>Stockpiling physical backups (D)</p> Signup and view all the answers

    What is the primary motivation for some insider threats concerning data theft?

    <p>Financial gain from selling sensitive data (A)</p> Signup and view all the answers

    Which of the following actions should organizations implement to mitigate insider threats?

    <p>Implement a zero-trust architecture (D)</p> Signup and view all the answers

    Which of the following best describes Shadow IT?

    <p>Use of IT resources without organizational approval (B)</p> Signup and view all the answers

    What form of insider threat involves an employee misusing their access privileges?

    <p>Data Theft (A)</p> Signup and view all the answers

    Which of the following is NOT a common motivation for insider threats?

    <p>Desire for organizational improvement (D)</p> Signup and view all the answers

    Regular audits in an organization help to address which type of risk?

    <p>Insider threats (C)</p> Signup and view all the answers

    Which characteristic of insider threats might stem from an employee's behavior rather than malicious intent?

    <p>Lack of awareness of cybersecurity best practices (D)</p> Signup and view all the answers

    What is a recommended strategy to manage Shadow IT within an organization?

    <p>Implement clear policies on technology usage (A)</p> Signup and view all the answers

    What is the primary goal of social engineering techniques?

    <p>To exploit human psychology for unauthorized access (A)</p> Signup and view all the answers

    Which motivational trigger is NOT commonly used by social engineers?

    <p>Technical Knowledge (A)</p> Signup and view all the answers

    Which of the following best describes pretexting in social engineering?

    <p>Creating a fabricated scenario to manipulate targets (B)</p> Signup and view all the answers

    What type of attack does 'vishing' refer to?

    <p>Voice phishing conducted over phone calls (B)</p> Signup and view all the answers

    Which option is NOT a practice to enhance security against social engineering?

    <p>Relying solely on user self-education (C)</p> Signup and view all the answers

    What is the purpose of implementing shielded wallets or sleeves for RFID access badges?

    <p>To prevent unauthorized RFID scanning (C)</p> Signup and view all the answers

    In the context of phishing attacks, 'whaling' specifically targets which group?

    <p>High-profile individuals or executives (B)</p> Signup and view all the answers

    Which of the following is a common technique used in phishing attacks?

    <p>Spear Phishing (A)</p> Signup and view all the answers

    What is the main characteristic of a worm compared to a virus?

    <p>Worms are standalone and self-replicating. (A)</p> Signup and view all the answers

    Which type of malware is designed to encrypt user data until a ransom is paid?

    <p>Ransomware (C)</p> Signup and view all the answers

    What distinguishes a Trojan from other types of malware?

    <p>It disguises itself as harmless software to gain unauthorized access. (B)</p> Signup and view all the answers

    Which of the following describes a keylogger?

    <p>Software that captures keystrokes and sensitive information. (D)</p> Signup and view all the answers

    What is a polymorphic virus?

    <p>A virus that rewrites itself to avoid detection. (C)</p> Signup and view all the answers

    What method do Trojans commonly exploit to achieve their goals?

    <p>Operating system vulnerabilities. (A)</p> Signup and view all the answers

    What is an indication of a potential malware attack?

    <p>Account lockouts. (D)</p> Signup and view all the answers

    Which type of virus operates by attaching itself to executable files?

    <p>Program Virus (A)</p> Signup and view all the answers

    What is the primary function of ransomware?

    <p>To encrypt data and demand payment for decryption. (A)</p> Signup and view all the answers

    Which characteristic best describes a rootkit?

    <p>Malware designed to hide its presence and activities. (B)</p> Signup and view all the answers

    What does a logic bomb do?

    <p>Executes malicious actions based on a triggering event. (B)</p> Signup and view all the answers

    What differentiates a virus from a worm?

    <p>A virus needs a host file to spread, while worms spread independently. (A)</p> Signup and view all the answers

    Which of the following represents a common characteristic of bloatware?

    <p>Consumes system resources without providing value. (B)</p> Signup and view all the answers

    What is a primary purpose of using deception and disruption technologies in cybersecurity?

    <p>To mislead and distract attackers (B)</p> Signup and view all the answers

    Which of the following methods best describes vishing?

    <p>Voice calls that trick victims into sharing information (C)</p> Signup and view all the answers

    What is the main characteristic of an attack surface?

    <p>Points of unauthorized access into a system (C)</p> Signup and view all the answers

    How do bollards function in physical security?

    <p>To deter unauthorized access by creating physical barriers (B)</p> Signup and view all the answers

    What type of attack involves trying all possible combinations until gaining access?

    <p>Brute force (C)</p> Signup and view all the answers

    Which technology is used to create a decoy system to attract potential hackers?

    <p>Honeypot (B)</p> Signup and view all the answers

    Which option describes a scenario that aims to exploit external vulnerabilities in wireless communications?

    <p>BlueBorne vulnerabilities (A)</p> Signup and view all the answers

    What strategy is often used to counteract unauthorized access in physical security?

    <p>Utilizing access control vestibules (C)</p> Signup and view all the answers

    Which method can attackers use to bypass a security camera?

    <p>Blocking the camera's line of sight (C)</p> Signup and view all the answers

    What is the primary function of physical security measures?

    <p>To protect tangible assets from unauthorized access (D)</p> Signup and view all the answers

    Which of the listed sensors detects movement based on changes in microwave pulses?

    <p>Microwave Sensors (A)</p> Signup and view all the answers

    How can organizations minimize their attack surface?

    <p>Restricting access and removing unnecessary software (C)</p> Signup and view all the answers

    What is the main advantage of surveillance systems in security?

    <p>To observe and report suspicious activities (B)</p> Signup and view all the answers

    Which method helps prevent attacks by ensuring only one door is open at a time?

    <p>Access control vestibule (C)</p> Signup and view all the answers

    Flashcards

    Insider Threats

    Cybersecurity threats originating from within an organization, with varying capabilities.

    Motivation of Insider Threats

    Different motivations drive insider threats, including financial gain, revenge, or carelessness.

    Data Theft (Insider Threat)

    A type of insider threat where sensitive data is stolen.

    Sabotage (Insider Threat)

    A type of insider threat where the system is damaged.

    Signup and view all the flashcards

    Shadow IT

    Using IT systems and applications without explicit company approval.

    Signup and view all the flashcards

    Zero-trust architecture

    A security strategy that assumes no one is trustworthy unless verified.

    Signup and view all the flashcards

    Access Controls

    Security measures to limit who can access sensitive company resources.

    Signup and view all the flashcards

    Employee Security Awareness

    Training and educational programs to promote good cybersecurity practices.

    Signup and view all the flashcards

    Crossover Error Rate (CER)

    The point where the False Acceptance Rate (FAR) and False Rejection Rate (FRR) are equal, representing a balance for optimal authentication.

    Signup and view all the flashcards

    Authentication Effectiveness

    The measure of how well a security system can accurately identify authorized users and prevent unauthorized access.

    Signup and view all the flashcards

    Multi-factor Authentication

    Using multiple authentication methods to increase security, like a password and fingerprint scan.

    Signup and view all the flashcards

    Cipher Locks

    Mechanical locks with numbered buttons requiring a specific combination to unlock, often used in high-security areas.

    Signup and view all the flashcards

    Access Badge Cloning

    Copying the data from an RFID or NFC card onto another device, allowing unauthorized access.

    Signup and view all the flashcards

    BYOD

    Using personal devices for work purposes.

    Signup and view all the flashcards

    Threat Vector

    The way an attacker gains unauthorized access to a system or network.

    Signup and view all the flashcards

    Attack Surface

    All points where an attacker can try to access a system or network.

    Signup and view all the flashcards

    Message-based threat vectors

    Threats delivered via email, SMS, or instant messaging.

    Signup and view all the flashcards

    Phishing

    Impersonating a trusted entity to trick victims into revealing sensitive information.

    Signup and view all the flashcards

    Image-based threat vectors

    Malicious code hidden within image files.

    Signup and view all the flashcards

    File-based threat vectors

    Malicious code disguised as legitimate documents or software.

    Signup and view all the flashcards

    Vishing

    Using voice calls to trick victims into revealing sensitive information.

    Signup and view all the flashcards

    Baiting (with removable devices)

    Leaving malware-infected USB drives in public places to lure victims.

    Signup and view all the flashcards

    Unsecure Networks

    Networks lacking security measures to protect data.

    Signup and view all the flashcards

    MAC Address Cloning

    An attack where an attacker pretends to be a legitimate device on the network.

    Signup and view all the flashcards

    VLAN Hopping

    An attack where an attacker gains access to other virtual networks on a network.

    Signup and view all the flashcards

    BlueBorne

    A set of vulnerabilities in Bluetooth technology allowing attackers to take over devices, spread malware, or intercept communications.

    Signup and view all the flashcards

    BlueSmack

    A Denial of Service attack targeting Bluetooth devices.

    Signup and view all the flashcards

    Deception and Disruption Technologies

    Technologies used to mislead, confuse, and divert attackers.

    Signup and view all the flashcards

    Social Engineering

    Manipulating people's psychology to gain unauthorized access to systems, data, or physical spaces.

    Signup and view all the flashcards

    Motivational Triggers

    The tactics social engineers use to exploit human psychology, including familiarity, consensus, authority, and urgency.

    Signup and view all the flashcards

    Impersonation

    Pretending to be someone else, including impersonating brands, using fake websites, or targeting specific groups.

    Signup and view all the flashcards

    Pretexting

    Creating a made-up scenario to manipulate targets into giving information or granting access.

    Signup and view all the flashcards

    Spear Phishing

    A targeted phishing attack focusing on specific individuals or groups using personalized information to increase legitimacy.

    Signup and view all the flashcards

    Whaling

    A targeted phishing attack specifically aimed at high-profile individuals, often executives or CEOs.

    Signup and view all the flashcards

    Influence Campaigns

    Spreading misinformation and disinformation, impacting politics, economics, or public opinion.

    Signup and view all the flashcards

    Ransomware Attack

    A type of malware that encrypts your files and demands payment to decrypt them.

    Signup and view all the flashcards

    Botnet

    A network of compromised computers controlled remotely by attackers, often used for malicious purposes.

    Signup and view all the flashcards

    Zombie (Computer)

    A computer infected with malware, controlled by an attacker without the owner's knowledge.

    Signup and view all the flashcards

    Command and Control Node

    The central computer in a botnet that receives instructions and sends commands to the infected machines.

    Signup and view all the flashcards

    What to do if you're hit by ransomware?

    Don't pay the ransom, disconnect the infected device, notify authorities, and restore from backups.

    Signup and view all the flashcards

    Attack Vector

    The method an attacker uses to infiltrate a victim's system. Examples: unpatched software, phishing campaigns, USB drive installation.

    Signup and view all the flashcards

    Virus

    Malicious code that attaches to clean files, spreads, and corrupts host files.

    Signup and view all the flashcards

    Worm

    Standalone program that replicates and spreads to other computers without user interaction.

    Signup and view all the flashcards

    Trojan

    Malicious software disguised as legitimate software, allowing unauthorized access.

    Signup and view all the flashcards

    Ransomware

    Encrypts user data and demands ransom for decryption.

    Signup and view all the flashcards

    Rootkit

    Hides its presence and activities on a computer, operating at the OS level.

    Signup and view all the flashcards

    Backdoor

    Allows unauthorized access to a system, bypassing normal security.

    Signup and view all the flashcards

    Keylogger

    Records keystrokes, capturing passwords or sensitive information.

    Signup and view all the flashcards

    Spyware

    Monitors and gathers user/system information, sending it to attackers.

    Signup and view all the flashcards

    Boot Sector Virus

    Infects the first sector of a hard drive, loading into memory during bootup.

    Signup and view all the flashcards

    Macro Virus

    Embedded inside documents, executing when the document is opened.

    Signup and view all the flashcards

    Program Virus

    Infect executable files, affecting applications.

    Signup and view all the flashcards

    Multipartite Virus

    Infects both boot sectors and program files, attacking multiple parts of the system.

    Signup and view all the flashcards

    Encrypted Virus

    Uses encryption to avoid detection, hiding its malicious code.

    Signup and view all the flashcards

    Study Notes

    CompTIA Security+ (SY0-701) Study Notes

    • The CompTIA Security+ (SY0-701) certification is an intermediate-level information technology certification.
    • It focuses on an individual's ability to assess the security posture of an enterprise environment.
    • This certification is for IT professionals or aspiring cybersecurity professionals who have already earned their CompTIA A+ and Network+ certifications.
    • The recommendation is that candidates have 1-2 years of experience with hardware, software, and networks.
    • The exam consists of five domains:
      • General Security Concepts (12%)
      • Threats, Vulnerabilities, and Mitigations (22%)
      • Security Architecture (18%)
      • Security Operations (28%)
    • The exam is 90 minutes long and contains 90 questions (multiple-choice and some multiple-select).
    • Candidates need a score of 750 points out of 900 to pass.
    • Exam vouchers can be purchased from the CompTIA store or Dion Training.
    • The price may vary by country due to regional pricing by CompTIA.
    • Dion Training offers a 10% discount on vouchers.
    • For success in the course, turn on closed captions, control the playback speed, and join the provided FB or Discord group. Avoid trick questions or red herrings. Focus on keywords, bolded words, and upper-case letters. Choose the answer that applies to the most number of situations.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    More Like This

    Untitled Quiz
    6 questions

    Untitled Quiz

    AdoredHealing avatar
    AdoredHealing
    Untitled Quiz
    37 questions

    Untitled Quiz

    WellReceivedSquirrel7948 avatar
    WellReceivedSquirrel7948
    Untitled Quiz
    55 questions

    Untitled Quiz

    StatuesquePrimrose avatar
    StatuesquePrimrose
    Untitled Quiz
    48 questions

    Untitled Quiz

    StraightforwardStatueOfLiberty avatar
    StraightforwardStatueOfLiberty
    Use Quizgecko on...
    Browser
    Browser