WGU D430 Fundamentals of Information Security MULTI/COMPREHENSIVE FINAL EXAM REVIEW

studied byStudied by 21 people
5.0(1)
Get a hint
Hint

The Fabrication attack type most commonly affects which principle(s) of the CIA triad?

A. Availability

B. Integrity

C. Confidentiality

D. Integrity and Availability

E. Confidentiality and Integrity

1 / 172

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

173 Terms

1

The Fabrication attack type most commonly affects which principle(s) of the CIA triad?

A. Availability

B. Integrity

C. Confidentiality

D. Integrity and Availability

E. Confidentiality and Integrity

Integrity and Availability

New cards
2

The Interception attack type most commonly affects which principle(s) of the CIA triad? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Integrity and Availability

B.Confidentiality and Integrity

C.Availability

D.Integrity

E.Confidentiality

Confidentiality

New cards
3

Something that has the potential to cause harm to our assets is known as a(n) ________.

A.Threat

B.Impact

C.Risk

D.Vulnerability

Threat

New cards
4

Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______.

A.Logical controls

B.Administrative controls

C.Physical controls

Logical Control

New cards
5

What is the first and arguably one of the most important steps of the risk management process?

A.Assess risks

B.Mitigate risks

C.Identify threats

D.Assess vulnerabilities

E.Identify assets

Identify assets

New cards
6

Protects information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction

information security

New cards
7

A type of attack, primarily against confidentiality

Interception

New cards
8

Something that has the potential to cause harm to our assets

Threat

New cards
9

A weakness that can be used to harm us

Vulnerability

New cards
10

The likelihood that something bad will happen

Risk

New cards
11

An attack that involves tampering with our assets

Modification attack

New cards
12

A model that adds three more principles to the CIA triad: possession or control, utility, and authenticity

Parkerian hexad

New cards
13

The physical disposition of the media on which the data is stored

Possession or control

New cards
14

An attack that involves generating data, processes, communications, or other similar activities with a system

Fabrication attack

New cards
15

A multilayered defense that will allow us to achieve a successful defense should one or more of our defensive measures fail

Defense in depth

New cards
16

Sometimes called technical controls, these protect the systems, networks, and environments that process, transmit, and store our data

Logical controls

New cards
17

Controls that protect the physical environment in which our systems sit, or where our data is stored

Physical controls

New cards
18

The risk management phase that consists of all of the activities that we can perform in advance of the incident itself, in order to better enable us to handle it

Preparation phase

New cards
19

The risk management phase where we detect the occurrence of an issue and decide whether it is actually an incident so that we can respond to it appropriately

Detection and analysis phase

New cards
20

The biometric characteristic that measures how well a factor resists change over time and with advancing age is called __________.

A. Collectability

B. Acceptability

C.Universality

D.Uniqueness

E.Permanence

E.Permanence

New cards
21

What type of authentication can prevent a man-in-the-middle attack? This task contains the radio buttons and checkboxes for options.

A.Multifactor

B.Mutual

C.Something you know

D.Something you are

ESomething you do

B.Mutual

New cards
22

An authentication mechanism in which both parties authenticate each other

Mutual authentication

New cards
23

Describes the ease with which a system can be tricked by a falsified biometric identifier

Circumvention

New cards
24

A user who creates a network share and sets permissions on that share is employing which model of access control? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A. Mandatory access control

B. Discretionary access control

C. Attribute-based access control

D. Role-based access control

Discretionary access control

New cards
25

What type of access control can prevent the confused deputy problem? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.ACLs

B.A password policy

C.Capability-based security

D.A locked door

Capability-based security

New cards
26

Confidential Services Inc. is a military-support branch consisting of 1,400 computers with Internet access and 250 servers. All employees are required to have security clearances. From the options listed below, what access control model would be most appropriate for this organization? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Discretionary access control

B.Role-based access control

C.Attribute-based access control

D.Mandatory access control

D.Mandatory access control

New cards
27

A VPN connection that is set to time out after 24 hours is demonstrating which model of access control? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Mandatory access control

B.Role-based access control

C.Attribute-based access control

D.Discretionary access control

Attribute-based access control

Lesson: Authorization and Access Control

Objective: More Advanced

New cards
28

States that we should allow only the bare minimum access required in order for a given party (person, user account, or process) to perform a needed functionality

Principle of least privilege

New cards
29

Typically built to a certain resource, these contain the identifiers of the party allowed to access the resource and what the party is allowed to do.

Access control lists (ACLs)

New cards
30

In this method of security, a person's capabilities are oriented around the use of a token that controls their access (e.g. a personal badge)

Capability-based security

New cards
31

A type of attack that is more common in systems that use ACLs rather than capabilities

The confused deputy problem

New cards
32

A type of attack that misuses the authority of the browser on the user's computer

Cross-site request forgery (CSRF)

New cards
33

Access is determined by the owner of the resource in question

Discretionary access control (DAC)

New cards
34

Similar to MAC in that access controls are set by an authority responsible for doing so, rather than by the owner of the resource. In this model, access is based on the role the individual is performing

Role-based access control (RBAC)

New cards
35

Access is based on attributes (of a person, a resource, or an environment)

Attribute-based access control

New cards
36

Designed to prevent conflicts of interest; commonly used in industries that handle sensitive data. Three main resource classes are considered in this model: objects, company groups, and conflict classes.

The Brewer and Nash model

New cards
37

A combination of DAC and MAC, primarily concerned with the confidentiality of the resource. Two security properties define how information can flow to and from the resource: the simple security property and the * property.

The Bell-LaPadula model

New cards
38

Primarily concerned with protecting the integrity of data, even at the expense of confidentiality. Two security rules: the simple integrity axiom and the * integrity axiom.

The Biba model

New cards
39

An access control model that includes many tiers of security and is used extensively by military and government organizations and those that handle data of a very sensitive nature

Multilevel access control model

New cards
40

What process ensures compliance with applicable laws, policies, and other bodies of administrative control, and detects misuse? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Nonrepudiation

B.Deterrence

C.Auditing

D.Accountability

E.Authorization

C.Auditing

Lesson: Auditing and Accountability

Objective: Introduction

New cards
41

Nessus is an example of a(n) _______________ tool. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Fuzzing

B.Anti-virus

C.Anti-malware

D.Vulnerability scanning

E.Penetration testing

D.Vulnerability scanning

New cards
42

A surveillance video log contains a record, including the exact date and time, of an individual gaining access to his company's office building after hours. He denies that he was there during that time, but the existence of the video log proves otherwise. What benefit of accountability does this example demonstrate? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Deterrence

B.Nonrepudiation

C.Intrusion detection and prevention

D.Authentication

E.Authorization

B.Nonrepudiation

New cards
43

_______ provides us with the means to trace activities in our environment back to their source. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Access

B.Authentication

C.Accountability

D.Authorization

E.Nonrepudiation

C.Accountability

New cards
44

Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based applications for parts design and information sharing. Due to the sensitive nature of the business, Backordered Parts would like to implement a solution that secures all browser connections to the Web servers. What encryption solution best meets this company's needs? This task contains the radio buttons and checkboxes for options.

A.Elliptic Curve Cryptography (ECC)

B.Digital signatures

C.Advanced Encryption Standard (AES)

D.Blowfish

A.Elliptic Curve Cryptography (ECC)

Lesson: Cryptography

Objective: Alert!

New cards
45

Question 3 : We are somewhat limited in our ability to protect which type of data? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Data at rest

B.Data in motion

C.Data in use

C.Data in use

New cards
46

he science of breaking through encryption is known as _____. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Ciphertext

B.Cryptology

C.Cryptography

D.Cryptanalysis

D.Cryptanalysis

New cards
47

The specifics of the process used to encrypt the plaintext or decrypt the ciphertext

Cryptographic algorithm

New cards
48

Also known as private key cryptography, this uses a single key for both encryption of the plaintext and decryption of the ciphertext

Symmetric key cryptography

Example: AES

New cards
49

A type of cipher that takes a predetermined number of bits in the plaintext message (commonly 64 bits) and encrypts that block

Block cipher

New cards
50

A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time

Stream cipher

New cards
51

A set of symmetric block ciphers endorsed by the US government through NIST. Shares the same block modes that DES uses and also includes other modes such as XEX-based Tweaked CodeBook (TCB) mode

AES

New cards
52

Also known as public key cryptography, this method uses two keys: a public key and a private key.

Asymmetric key cryptography

New cards
53

Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic

Secure Sockets Layer (SSL) protocol

New cards
54

Also referred to as message digests, these functions do not use a key

Hash functions

New cards
55

Infrastructure that includes the CAs that issue and verify certificates and the registration authorities (RAs) that verify the identity of the individuals associated with the certificates

Public key infrastructure (PKI)

New cards
56

______ regulates the financial practice and governance of corporations. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.GLBA

B.FISMA

C.SOX

D.FERPA

E.HIPAA

C.SOX

New cards
57

Regulations mandated by law, usually requiring regular audits and assessments

Regulatory Compliance

New cards
58

This act safeguards privacy through the establishment of procedural and substantive rights in personal data

The Federal Privacy Act of 1974

New cards
59

Question : Risk can be higher when ___________ services are used for computing operations. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.auditing

B.competitive intelligence

C.cloud computing

D.OPSEC

C.cloud computing

New cards
60

Laws of OPSEC

1.If you don't know what to protect, how do you know you are protecting it?

2.If you don't know the threat, how do you know what to protect?

3.If you are not protecting it (i.e. the information), THE DRAGON WINS!

1.If you don't know the threat, how do you know what to protect?

2.If you don't know what to protect, how do you know you are protecting it?

3.If you are not protecting it (i.e. the information), THE DRAGON WINS!

New cards
61

During what phase of the operations security process do we match threats and vulnerabilities? T

A.Assessment of risks

B.Analysis of vulnerabilities

C.Analysis of threats

D.Identification of critical information

E.Application of countermeasures

A.Assessment of risks

New cards
62

Haas' second law of operations security, "If you don't know what to protect, how do you know you are protecting it?," maps to what step in the operations security process?

A.Analysis of threats

B.Analysis of vulnerabilities

C.Assessment of risks

D.Application of countermeasures

E.Identification of critical information

E.Identification of critical information

New cards
63

You are leaving for an extended vacation and want to take steps to protect your home. You set a timer to turn lights and the TV on and off at various times throughout the day, suspend the mail delivery, and arrange for a neighbor to come in and water the plants. What step in the operations security process do these actions demonstrate? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Identification of critical information

B.Analysis of threats

C.Analysis of vulnerabilities

D.Assessment of risks

E.Application of countermeasures

E.Application of countermeasures

New cards
64

The process of intelligence gathering and analysis to support business decisions is known as _______.

A.Competitive intelligence

B.Competitive business

C.Business intelligence

D.Business competition

E.Counter intelligence

A.Competitive intelligence

New cards
65

The study that was conducted to discover the cause of the information leak during the Vietnam War was codenamed ________ and is now considered a symbol of OPSEC.

A.Sun Tzu

B.Vietnam Viper

C.The Art of War

D.Purple Dragon

D.Purple Dragon

New cards
66

The process of intelligence gathering and analysis in order to support business decisions

Competitive intelligence

New cards
67

Name the five steps of the operations security process

1.Identification of critical information

2.Analysis of threats

3.Analysis of vulnerabilities

4.Assessment of risks

5.Application of countermeasures

1.Identification of critical information

2.Analysis of threats

3.Analysis of vulnerabilities

4.Assessment of risks

5.Application of countermeasures

New cards
68

Haas' Laws of Operations Security: The First Law

If you don't know the threat, how do you know what to protect?

New cards
69

Haas' Laws of Operations Security: The Second Law

If you don't know what to protect, how do you know you are protecting it?

New cards
70

Haas' Laws of Operations Security: The Third Law

If you are not protecting it, the dragon wins!

New cards
71

The first step in the OPSEC process, and arguably the most important: to identify the assets that most need protection and will cause us the most harm if exposed

Identification of critical information

New cards
72

The second step in the OPSEC process: to look at the potential harm or financial impact that might be caused by critical information being exposed, and who might exploit that exposure

Analysis of threats

New cards
73

The third step in the OPSEC process: to look at the weaknesses that can be used to harm us

Analysis of vulnerabilities

New cards
74

The fourth step in the OPSEC process: to determine what issues we really need to be concerned about (areas with matching threats and vulnerabilities)

Assessment of risks

New cards
75

The fifth step in the OPSEC process: to put measures in place to mitigate risks

Application of countermeasures

New cards
76

Name the most common security awareness issues

Protecting data, passwords, social engineering, network usage, malware, the use of personal equipment, clean desk, policy knowledge

Name the most common security awareness issues

Protecting data, passwords, social engineering, network usage, malware, the use of personal equipment, clean desk, policy knowledge

New cards
77

A technique used by an attacker that relies on the willingness of people to help others

Social engineering

New cards
78

A technique involving a fake identity and a believable scenario that elicits the target to give out sensitive information or perform some action which they would not normally do for a stranger

Pretexting

New cards
79

A social engineering technique that uses electronic communications (email, texts, or phone calls) to convince a potential victim to give out sensitive information or perform some action

Phishing

New cards
80

A social engineering technique that targets a specific company, organization, or person, and involves knowing specifics about the target to appear valid

Spear phishing

New cards
81

A program that seeks to make users aware of the risk they are accepting through their current actions and attempts to change their behavior through targeted efforts

Security Awareness, Training, and Education (SATE)

New cards
82

What planning process ensures that critical business functions can continue to operate during an emergency?

A.Incident response planning

B.Risk management planning

C.Operations security planning

D.Disaster recovery planning

E.Business continuity planning

E.Business continuity planning

New cards
83

What planning process ensures that we can respond appropriately during and after a disaster?

A.Incident response planning

B.Risk management process

C.Operations security process

D.Disaster recovery planning

E.Business continuity planning

D.Disaster recovery planning

New cards
84

Your company has an office full of expensive computer equipment to protect. You recommend a variety of approaches, including a security guard stationed at the entrance, a high fence around the property, and key card entry to all nonpublic areas. What security concept are you recommending to protect your company's assets?

A.Defense in depth

B.Nonrepudiation

C.Capability-based security

D.Access control lists

E.Principle of least privilege

A.Defense in depth

New cards
85

Which of the options below demonstrates all three types of physical security controls: deterrent, detective, and preventive?

A.A burglar alarm

B.A guard dog

C.A locked door

D.A warning sign

E.An employee policy

B.A guard dog

New cards
86

Name three main types of physical controls

Deterrent, detective, and preventive

Deterrent, detective, and preventive

New cards
87

Hping3: A tool used to test the security of firewalls.

Hping3: A tool used to test the security of firewalls.

New cards
88

Kismet: A tool used to detect unauthorized wireless access points.

Kismet: A tool used to detect unauthorized wireless access points.

New cards
89

Nmap: A versatile tool able to scan ports, search for hosts on the network, and other operations.

Nmap: A versatile tool able to scan ports, search for hosts on the network, and other operations.

New cards
90

Tcpdump: This command-line packet sniffing tool runs on Linux and UNIX operating systems.

Tcpdump: This command-line packet sniffing tool runs on Linux and UNIX operating systems.

New cards
91

Wireshark: A graphical interface protocol analyzer capable of filtering, sorting, and analyzing both wired and wireless network traffic.

Wireshark: A graphical interface protocol analyzer capable of filtering, sorting, and analyzing both wired and wireless network traffic.

New cards
92

_____________ is a sniffer that specializes in detecting wireless devices.

A.Hping3

B.Kismet

C.Wireshark

D.NetStumbler

B.Kismet

New cards
93

A tool that deliberately displays vulnerabilities in an attempt to bait attackers is called _____________.

A.A vulnerability assessment scanner

B.A honeypot

C.A fuzzer

D.A sniffer

E.A port scanner

B.A honeypot

New cards
94

A firewall that can watch packets and monitor the traffic from a given connection is using what kind of firewall technology?

A.Deep packet inspection

B.Stateful packet inspection

C.Packet filtering

B.Stateful packet inspection

New cards
95

_____________ is a popular, fully-featured sniffer capable of intercepting traffic from a wide variety of wired and wireless sources.

A.Wireshark

B.Kismet

C.Hping3

D.NetStumbler

A.Wireshark

New cards
96

A specialized type of firewall that provides security and performance features, functions as a choke point, allows for logging traffic for later inspection, and serves as a single source of requests for the devices behind it is known as a(n) ____________

A.Proxy server

B.FTP server

C.Packet sniffer

D.Web server

E.Intrusion detection system

A.Proxy server

New cards
97

This method of security involves a well-configured and patched network, and incorporating elements such as network segmentation, choke points, and redundancy

Security in network design

New cards
98

The act of dividing a network into multiple smaller networks, each acting as its own small network (subnet)

Network segmentation

New cards
99

Certain points in the network, such as routers, firewalls, or proxies, where we can inspect, filter, and control network traffic

Choke points

New cards
100

A firewall technology that inspects the contents of each packet in network traffic individually and makes a gross determination (based on source and destination IP address, port number, and the protocol being used) of whether the traffic should be allowed to pass

Packet filtering

New cards

Explore top notes

note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 2 people
... ago
5.0(1)
note Note
studied byStudied by 7 people
... ago
4.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 4 people
... ago
5.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (36)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (53)
studied byStudied by 29 people
... ago
5.0(2)
flashcards Flashcard (21)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 132 people
... ago
5.0(4)
flashcards Flashcard (44)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (200)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (146)
studied byStudied by 18 people
... ago
5.0(3)
robot