Essential Security Principles Flashcards

(75 cards)

1
Q

In cybersecurity, what term describes a weakness in a system or design that can be exploited by a threat actor?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What term refers to a potential danger or actor that could take advantage of a system weakness?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the specific piece of code or technique used to take advantage of a vulnerability to cause unintended behavior?

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which formula is used to calculate the level of risk associated with a specific vulnerability?

A

Risk = Likelihood x Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The path or method an attacker uses to gain unauthorized access to a system, such as a phishing email or unpatched port, is an _____.

A

Attack Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the process of securing a system by reducing its attack surface through measures like disabling unnecessary services?

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which security strategy uses multiple layered controls throughout an infrastructure to ensure that if one fails, another is there to catch the threat?

A

Defense-in-Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Concept: Confidentiality

A

Definition: Ensuring that data is accessible only to authorized users to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which component of the CIA triad ensures that data is accurate, complete, and has not been improperly modified?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The goal of ensuring that authorized users can access the system and data when needed is called _____.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of attacker uses pre-written tools and is primarily motivated by curiosity or bragging rights?

A

Script Kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary motivation for a Hacktivist threat actor?

A

Promoting a political or social cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat actors associated with Organized Crime are primarily motivated by _____.

A

Financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of threat actor works for a government and is motivated by espionage, economic advantage, or warfare?

A

State-Sponsored (Nation State)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What ethical guideline requires cybersecurity professionals to disclose vulnerabilities responsibly and maintain non-malicious intent?

A

Code of Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the general term for malicious software designed to cause damage or gain unauthorized access to a system?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which type of malware encrypts a victim’s files and demands payment for the decryption key?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary difference between a DoS attack and a DDoS attack?

A

A DDoS attack uses multiple compromised systems (a botnet) rather than a single source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A network of compromised computers controlled by an attacker to perform malicious tasks is known as a _____.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What technique involves manipulating people into divulging confidential information or performing unauthorized actions?

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which phishing variant uses mass emails to trick a large group of users into revealing credentials?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the term for a highly targeted phishing attack aimed at a specific individual or organization?

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A targeted social engineering attack aimed specifically at a high-value individual, such as an executive, is called _____.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the term for a phishing attack conducted specifically through voice calls or VoIP?

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A phishing attempt conducted via SMS or text messages is known as _____.
Smishing
26
Which physical social engineering technique involves an unauthorized person following an authorized person into a secure area?
Tailgating
27
What type of attack involves an intruder secretly relaying and possibly altering communication between two parties?
Man-in-the-Middle (MITM)
28
Why do IoT devices often represent a significant security vulnerability?
They often have weak security, default passwords, and a lack of consistent patching.
29
Security risks originating from people within an organization, such as employees or contractors, are classified as _____.
Insider Threats
30
What does the acronym APT stand for in the context of prolonged, targeted, and sophisticated cyber attacks?
Advanced Persistent Threat
31
In the AAA framework, which step is responsible for verifying the identity of a user?
Authentication
32
In the AAA framework, what process determines the specific resources a user is allowed to access after their identity is verified?
Authorization
33
The 'Accounting' component of AAA is primarily concerned with _____.
Tracking and logging user actions
34
Which centralized AAA protocol is commonly used for managing network access for VPNs and Wi-Fi?
RADIUS (Remote Authentication Dial-In User Service)
35
What security requirement mandates the use of two or more different types of verification factors for access?
Multi-Factor Authentication (MFA)
36
Why are two different passwords for the same account not considered Multi-Factor Authentication?
They are two instances of the same factor (knowledge) rather than different factors.
37
What are the three common categories of MFA factors?
Something you know, something you have, and something you are.
38
An MFA factor such as a fingerprint or retina scan falls under the category of something you _____.
Are (Biometric)
39
Organizational rules that dictate minimum length, complexity, and rotation intervals for passwords are known as _____.
Password Policies
40
Which type of encryption uses a single shared key for both the encryption and decryption of data?
Symmetric Encryption
41
Asymmetric encryption is defined by the use of two different keys, which are the _____.
Public key and private key
42
What process converts data into a fixed-size string of characters to verify its integrity?
Hashing
43
Which framework manages digital certificates, including their creation, distribution, and revocation?
Public Key Infrastructure (PKI)
44
What is the primary purpose of a Digital Certificate?
To verify the identity of an entity and provide its public key.
45
Data that is currently residing on a hard drive, flash drive, or cloud storage is classified as data _____.
At rest
46
What is the classification for data that is currently moving across a network between two points?
Data in transit
47
Data that is actively being processed by the CPU or stored in RAM is referred to as data _____.
In use
48
Which security protocol is used to provide encryption for web traffic (HTTPS)?
TLS/SSL
49
What is the secure replacement for Telnet used for the encrypted remote management of devices?
SSH (Secure Shell)
50
Which suite of protocols is primarily used to secure communication in VPNs?
IPsec
51
The use of a digital signature on a document primarily supports which component of the CIA triad?
Integrity
52
Which social engineering technique involves creating a fabricated scenario to trick a victim into providing information?
Pretexting
53
A social engineering attack where an enticing item, like a malware-infected USB drive, is left in a public place for a victim to find is called _____.
Baiting
54
Concept: Steganography
Definition: The practice of hiding information within another non-secret file, such as an image, to maintain confidentiality.
55
Under the principle of _____, users should only be granted the minimum permissions necessary to perform their job functions.
Least Privilege
56
How does an Intrusion Detection System (IDS) differ from an Intrusion Prevention System (IPS) regarding network traffic?
An IDS only monitors and alerts on suspicious traffic, while an IPS can actively block it.
57
Which component of the CIA triad is compromised during a successful DDoS attack?
Availability
58
A 'zombie' computer in the context of cybersecurity refers to a single member of a _____.
Botnet
59
In hashing, what does a 'collision' refer to?
When two different inputs produce the same hash output.
60
Which risk management strategy involves shifting the financial burden of a risk to a third party, such as an insurance company?
Risk Transference
61
Acknowledging a risk but choosing to take no action because the cost of mitigation exceeds the potential impact is called _____.
Risk Acceptance
62
Which risk management approach involves eliminating the risky activity or technology entirely?
Risk Avoidance
63
What is the primary objective of Risk Mitigation (Reduction)?
To implement controls that lower the likelihood or impact of a threat exploiting a vulnerability.
64
Classifying data into categories like 'Public,' 'Internal,' and 'Confidential' is a process used to determine appropriate _____.
Security controls and protections
65
The art of using psychological manipulation to trick humans into giving up passwords is known as _____.
Social Engineering
66
What is the major security drawback of using symmetric encryption for a large number of users?
Key management becomes difficult because every pair of users needs a unique shared key.
67
Which state of data is generally considered the hardest to protect with encryption?
Data in use
68
A hacker who identifies vulnerabilities with the permission of the owner to improve security is known as a _____.
White Hat (Ethical Hacker)
69
What defines a Black Hat hacker?
An individual who attacks systems for illegal gain or with malicious intent.
70
The practice of physical social engineering where an attacker observes a user entering a PIN or password is known as _____.
Shoulder Surfing
71
Which social engineering tactic involves searching through trash to find discarded documents containing sensitive information?
Dumpster Diving
72
In the context of the CIA triad, using redundant power supplies and data backups primarily supports _____.
Availability
73
What is the core security benefit of implementing Multi-Factor Authentication?
It ensures that even if one factor (like a password) is stolen, the account remains protected by other factors.
74
Hashing is a one-way process, meaning it is impossible to _____ the original data from the hash value.
Reverse (or decrypt)
75
Which encryption type is commonly used for the initial secure exchange of symmetric keys over an untrusted network?
Asymmetric Encryption