Mod 01 Introduction to Security PDF
Document Details
Uploaded by NeatestMemphis
Tags
Related
- GT101 Learning and Information Technology PDF
- Professional Responsibility in Information Technology ITBP 370 - Fall 2024 UAE University
- IAT-2 Syllabus & Question Bank (CNS) 2023-24 PDF
- Discovering Computers Enhanced Edition 2017 PDF
- SENG 411 Cyber Security Lecture Notes PDF
- Comp 101: Introduction to Computing - Security and Privacy (PDF)
Summary
This document is an introduction to security, presenting questions on different types of threat actors, platforms, and vulnerabilities.
Full Transcript
ITSY1400 Mod 01: Introduction to Security 1. Which type of threat actor would benefit the most from accessing your enterprise's new machine learning algorithm research and development program? a. Shadow IT b. Brokers c. Criminal syndicates d. Competitors 2. Which of the following t...
ITSY1400 Mod 01: Introduction to Security 1. Which type of threat actor would benefit the most from accessing your enterprise's new machine learning algorithm research and development program? a. Shadow IT b. Brokers c. Criminal syndicates d. Competitors 2. Which of the following types of platforms is known for its vulnerabilities due to age? a. On-premises platform b. Cloud platform c. Legacy platform d. Online platform 3. Your enterprise has played fast and loose with customer information for years. While there has been no significant breach of information that could damage the organization and/or their customers, many in the enterprise feel it is only a matter of time before a major leak occurs. Which type of threat actor is an employee who wishes to personally ensure that the enterprise is exposed and blocked from accessing their customers' information until they ensure more secure protocols? a. Hacktivist b. Insider c. State actor d. Script kiddy 4. Threat actors focused on financial gain often attack which of the following main target categories? a. Product lists b. Individual users c. Social media assets d. REST services 5. Which issue can arise from security updates and patches? a. Difficulty patching firmware b. Difficulty updating settings c. Difficulty resetting passwords d. Difficulty installing databases 6. Which of the following is an attack vector used by threat actors to penetrate a system? a. Phishing b. Intimidation c. Urgency d. Email 7. What is a variation of a common social engineering attack targeting a specific user? a. Spear phishing b. Redirection c. Spam Page 1 d. Watering holes 8. Which of the following is a social engineering method that attempts to influence the subject before the event occurs? a. Spear phishing b. Redirection c. Prepending d. Watering hole 9. Which attack embeds malware-distributing links in instant messages? a. Spam b. Spim c. Phishing d. Tailgating 10. Your enterprise experienced several technical issues over the last few days. There were multiple instances of passwords needing to be changed and other issues causing downtime. Management has started receiving voicemails regarding fraudulent activities on their accounts. While the voicemails sound authentic, the help desk concludes that they are fake. What type of malicious activity will this be considered? a. Spimming b. Whaling c. Spamming d. Vishing 11. Attackers have taken over a site commonly used by an enterprise's leadership team to order new raw materials. The site is also visited by leadership at several other enterprises, so taking this site will allow for attacks on many organizations. Which type of malicious activity is this? a. Spear phishing b. Hoax c. Watering hole d. Vishing 12. Over the last few days, several employees in your enterprise reported seeing strange messages containing links in their company's IM account. Even though no one has clicked on the messages, they are spreading throughout the network. Which type of malicious activity is this? a. Spear phishing b. Whaling c. Spimming d. Vishing 13. Which threat actors sell their knowledge to other attackers or governments? a. Brokers b. Cyberterrorists ITSY1400 Mod 01: Introduction to Security c. Competitors d. Criminal syndicates 14. Which of the following is the most common method for delivering malware? a. Removable media b. Social media c. Email d. Identity theft 15. Which of the following computing platforms is highly vulnerable to attacks? a. On-premises b. Cloud c. Legacy d. Hybrid 16. Your company is considering updating several electronic devices used in the enterprise network. The third- party service provider that your company approached says that they require access to the enterprise network in order to implement the updates. As the chief information security officer, you are asked to analyze the requirement and submit a report on potential vulnerabilities when giving a third-party access to the network. Which of the following vulnerabilities should you list as the most likely to affect the enterprise network? a. Zero day b. Weakest link c. Weak encryption d. Default settings 17. What is an officially released software security update intended to repair a vulnerability called? a. Firmware b. Vector c. Patch d. Default 18. Your company recently purchased routers with new and updated features and deployed them in the highly secure enterprise network without changing the default settings. A few days later, the enterprise network suffered a data breach, and you are assigned to prepare a report on the data breach. Which of the following vulnerabilities should you identify as the source of the breach? a. Platform vulnerability b. Configuration vulnerability c. Third-party vulnerability d. Zero-day vulnerability 19. Zero-day vulnerabilities and configuration vulnerabilities can heavily impact a system if exploited. How should you differentiate between a zero-day vulnerability and a configuration vulnerability? a. A zero-day vulnerability results from improper hardware configurations, whereas a configuration vulnerability results from improper software configuration. Page 3 b. A zero-day vulnerability is an easily fixable vulnerability recognized by a software developer, whereas a configuration vulnerability is a major vulnerability present in a system exploited by a threat actor before the software developer can fix it. c. A zero-day vulnerability is an unknown vulnerability in released software that is found and exploited by a threat actor, whereas a configuration vulnerability is caused by improper settings in hardware or software. d. A zero-day vulnerability results from users improperly configuring software, whereas a configuration vulnerability results from the developers improperly configuring the software. 21. Which of the following is a configuration vulnerability? a. Weakest link b. Weak encryption c. Zero day d. Direct access 22. You work for an enterprise that provides various cybersecurity services. You are assigned to examine an enterprise's network and suggest security measures modifications, if necessary. On examining the network, you find that the enterprise hosts most of its computing resources on a cloud platform and few resources on- premises, and both seem to have secure settings implemented. You also find that the enterprise computers use the Windows XP operating system. Which of the following vulnerabilities should you insist on fixing first? a. Platform vulnerability b. Configuration vulnerability c. Zero-day vulnerability d. Third-party vulnerability 23. An unauthorized person recently accessed your enterprise network. The security team had received a call from the threat actor claiming to be a higher official. They followed the attacker's instructions to log them onto a specific webpage, leading to the exposure of enterprise network credentials. Which of the following social engineering techniques was used here? a. Hoaxes and impersonation b. Spam and phishing c. Impersonation and phishing d. Hoaxes and spam 24. Social engineering is a means of eliciting information by relying on the weaknesses of individuals. How should you differentiate between the social engineering techniques of phishing and pharming? a. Phishing involves sending millions of generic email messages to a large volume of users, whereas pharming targets specific users by sending emails customized to the recipients, including their names and personal information. b. Phishing involves sending customized emails to recipients, including their names and personal information, to make the message appear legitimate, whereas pharming is a variant of phishing that specifically targets wealthy individuals or senior executives within a business. c. Phishing involves sending an email message or displaying a web announcement that falsely claims to be from a legitimate enterprise, whereas pharming is a redirection technique that attempts to exploit how a URL is converted into its corresponding IP. d. Phishing involves digging through trash receptacles to find information that can be useful in an attack, whereas pharming involves sending millions of unsolicited emails to a large volume of users. ITSY1400 Mod 01: Introduction to Security 26. Several websites use URLs similar to one of the most globally popular websites, attempting to attract traffic if a user misspells the popular website's URL. What is this social engineering technique called? a. Pharming b. Spam c. Tailgating d. Typo squatting 27. Which threat actors violate computer security for personal gain? a. White hat hackers b. Gray hat hackers c. Black hat hackers d. Red hat hackers 28. A federal appeals court recently made a judgment that caused significant public outrage. Soon after the ruling, the court's website was hacked, and the content was replaced with the text "Equal justice for all." Which of the following type of threat actors attacked the court's site? a. Insiders b. Cyberterrorists c. Hacktivists d. State actors 29. In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment of enterprises and users. How should you differentiate an attack by a script kiddie from that of a gray hat hacker? a. Script kiddies construct efficient scripts to perform attacks to fulfill their own needs, whereas gray hat hackers construct scripts for attacking organizational competitors. b. Script kiddies lack the technical knowledge to carry out attacks, so they hire a hacker to do it, whereas gray hat hackers violate computer security to fulfill their financial needs. c. Script kiddies are hired to probe systems for weaknesses and then privately provide that information back to the organization, whereas gray hat hackers break into systems for ideological or political reasons. d. Script kiddies use automated attack software created by other hackers for personal gain, whereas gray hat hackers create their own attack software to showcase vulnerabilities present in a system to the world. 30. Hacktivists and state actors are huge threats to government systems. What is the main difference between hacktivists and state actors? a. Hacktivists are covertly sponsored by a government to attack its foes, whereas state actors misuse a computer system or network for personal, social, or political reasons. b. Hacktivists misuse a computer system or network for socially or politically motivated reasons, whereas state actors are covertly sponsored by a government to attack its foes. c. Hacktivists attack their own enterprise network for political revenge or personal gain, whereas state actors attack a nation's network and computer infrastructure to cause disruption and panic among citizens. d. Hacktivists attack a nation's network and computer infrastructure to cause disruption and panic among citizens, whereas state actors attack their own enterprise network for political revenge or personal gain. Page 5