CTEC Exam Preparation

5.0(1)
studied byStudied by 1 person
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

The rules of communication that web sites use to exchange data.

HTTP

2
New cards

What is an exploit in the context of cybersecurity?

A sequence of commands that takes advantage of a vulnerability in a computer system

3
New cards

(NOCTI) Hypertext Transfer Protocol Secure operates on port

443

4
New cards

Advertising software that can automatically download les or link to websites.

adware

5
New cards

The term for a small local area network of computers and devices.

LAN

6
New cards

Where in the cybersecurity lifecycle does one's personal inventory belong?

IDENTIFY

7
New cards

Identifies, Protects, Responds, Recovers

Cybersecurity Lifecycle

8
New cards

What is the general term for software that is intended to do harm or damage?

malware

9
New cards

(NOCTI) This technology was developed to allow remote users and branch offices to access corporate applications and resources via secure encrypted connection.

Virtual Private Network (VPN)

10
New cards

The arrangement of the various elements (computers, routers, switches, etc)

network topology

11
New cards

The trail that you leave behind when you engage in online experiences is called

digital footprint

12
New cards

(NOCTI) Restricting access to a website for a specific user group.

blacklisting

13
New cards

How does a MAC address differ from an IP address?

A MAC address is assigned by the manufacturer, while an IP address is assigned by the network

14
New cards

What is the primary goal of the Availability component in the CIA Triad?

Ensuring data is available when needed

15
New cards

What is the common goal of ransomware attacks?

To demand payment for data recovery

16
New cards

Why is Availability important in the context of e-commerce websites?

To ensure users can access the site anytime

17
New cards

What is the primary goal of the Confidentiality component in the CIA Triad?

Protecting data from unauthorized access

18
New cards

What is the term to guess or discover information, especially a password

Crack

19
New cards

(NOCTI) Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.

phishing

20
New cards

(NOCTI) Ensuring information is safe and has not been compromised keeping data authentic, accurate, and reliable is known as

integrity

21
New cards

(NOCTI) When establishing that a WPA3 network is not feasible due to client hardware requirements, the next best security wireless protocol is

WPA2

22
New cards

Software that can stop malware from entering a network, computer, or device

firewall

23
New cards

The set of techniques used to protect networks and digital information from attack, damage, or unauthorized access.

Cybersecurity

24
New cards

How can e-commerce sites protect customer information?

By encrypting sensitive data

25
New cards

What is the term for irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail?

spam

26
New cards

What is a disadvantage of symmetric key encryption?

The algorithm requires a relatively larger key space

27
New cards

(NOCTI) What is the cipher in which each letter in an alphabet is replaced with a different character or symbol?

substitution cipher

28
New cards

What is the method that places covert information into parts of overt les that are usually ignored?

insertion method

29
New cards

(NOCTI) What is when the sender and receiver share a single private key to use in the encryption algorithm?

symmetric key encryption

30
New cards

(NOCTI) The numeric code provided in an SMS or text message used for Multi-Factor Authentication (MFA) is called?

One Time Passcode

31
New cards

What is an advantage of asymmetric key encryption?

Significantly more secure than symmetric key encryption

32
New cards

What uses two keys, a public key available to everyone and a private key belonging to one owner?

asymmetric key encryption

33
New cards

What is the practice of concealing messages within other data, such as text or images?

steganography

34
New cards

What is the science or art of delivering a message securely and confidentially?

cryptography

35
New cards

What is the encrypted message generated by a cipher?

cipher text

36
New cards

What is the cipher that uses a key to encrypt or decrypt a message?

vigenere cipher

37
New cards

What is the motivational goal behind companies that steal information from competitors to gain the upper hand or eliminate the competition?

Industrial Espionage

38
New cards

This is a person sending fraudulent emails that appears to be from legitimate companies with the intent to induce people to share sensitive information.

Phisher

39
New cards

(NOCTI) An IT technician exploited the company’s website using a Cross-Site Scripting exploit after the company refused to respond to their request to x the vulnerability. The technician is an example of a _____ hat hacker.

gray

40
New cards

What is the motivational goal behind hackers engaged to change aspects of society, such as disrupting terrorists, promoting human rights, and/or exposing an injustice?

Social Ideology

41
New cards

(NOCTI) When someone is assigned only the rights and privileges necessary to do their job, this is referred to as

least privilege

42
New cards

Which of the following is considered a Man-In-The-Middle Attack?

An attacker intercepts information the client sends and establishes a secure session with the intended website.

43
New cards

What is the motivational goal behind a criminal that steals money from individuals and corporations, such as banks and lending houses?

Financial Gain

44
New cards

The term for a weakness in a system that allows an attacker to gain unauthorized access.

vulnerability

45
New cards

What is the most likely scenario if you double click on the following file "filename.exe.txt"?

A text editor like notepad.exe will execute

46
New cards

An application's certificate indicates that the application is

authentic

47
New cards

What is term for a systematic attempt to crack a password by testing with words and phrases found in online dictionaries?

Dictionary Attack

48
New cards

How do you identify signs of malware infection during a Cyber Forensics investigation?

requires observing unusual network traffic, unexpected system behavior, altered file timestamps, and/or the presence of suspicious files or processes.

49
New cards

(NOCTI) To ensure the safety of user accounts and web applications, a user should

use different passwords for each account

50
New cards

(NOCTI) When someone is assigned only the rights and privileges necessary to do their job, this is referred to as

least privilege

51
New cards

(NOCTI) Applying OS updates and patches to a newly installed operating system should be done

one of the first steps after installation

52
New cards

(NOCTI) A phishing attack that targets a high-prole employee to obtain information is an example of

whaling

53
New cards

A broad category for techniques that aim to psychologically manipulate a person's trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a le, or answering a question.

social engineering

54
New cards

An attempt to crack a password through trial and error.

brute force attack

55
New cards

What is the best way to protect yourself from a social engineering attack?

Limit the personal information that you post online

56
New cards

Selective process of allowing or restricting the availability of a resource.

access control

57
New cards

What is the basis for access control?

need to know

58
New cards

What is a common method to ensure data Integrity?

Restricting access to who can modify the data

59
New cards

The term for the way an organization structures and organizes the information that is required by their employees and/or customer.

Information Architecture

60
New cards

What is the primary purpose of a firewall in a network topology?

To block unauthorized access while permitting authorized access

61
New cards

What is a common method used in DDoS attacks?

Overloading a server with fake traffic

62
New cards

What is the purpose of a DDoS attack?

To degrade system performance

63
New cards

Which of the following is considered a Man-in-the-Middle attack?

An attacker intercepts information to the client sends and establishes a secure session with the intended website.

64
New cards

Software that replicates and infects many computers, turning the computer in a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.

Botnet

65
New cards

Human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.

On Path Attack

66
New cards

Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.

Rootkit

67
New cards

Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it

Ransomware

68
New cards

Which of the following is a protection measure against XSS?

Data Cleansing

69
New cards

What happens during a successful SQL injection attack?

Unauthorized data can be accessed, modified, or deleted

70
New cards

How does a cross-site scripting exploit change a web page?

By executing JavaScript that runs in the browser.

71
New cards

A tool for analyzing and monitoring network traffic at the packet level

packet sniffer

72
New cards

Allows or denies packets based on source and destinations addresses, ports, or protocols

packet filtering

73
New cards

The primary purpose of this artifact in network analysis is to capture and analyze network packet data

pcap file

74
New cards

What is the command to execute a command as another user without providing the root password?

sudo

75
New cards

(NOCTI) Which allows a user to access a computer system using credentials such as a password?

authentication

76
New cards

What is a significant risk associated with the Internet of Things (IoT)?

expanded area for cyberattacks

77
New cards

What is to give permission?

authorize

78
New cards

What is the primary difference between unauthorized and authorized hacking?

Authorized hacking is done with permission and ethical intent

79
New cards

(NOCTI) What is the best physical security to use in a data center to secure the servers?

biometric reader

80
New cards

(NOCTI) Which is an example of the authentication method that a user will have?

smart card

81
New cards

What is a term for a system that can distinguish between a human and an automated program?

CAPTCHA

82
New cards

(NOCTI) This technology was developed to allow remote users and branch offices to access corporate applications and resources via secure encrypted connection.

Virtual Private Network (VPN)

83
New cards

(NOCTI) Non-repudiation confirms the identity of the sender of a digital message for a recipient who uses the _____ key.

sender's public

84
New cards

Benefit of performing passive analysis on a website

observes a site without affecting it

85
New cards

Involves examining the contents of network packets to understand communication patterns, detect unauthorized activities, and identify potential security breaches.

network packet analysis

86
New cards

Use scripts, software, or algorithms to process and analyze large volumes of data quickly, enabling investigators to identify patterns and anomalies efficiently.

automated analysis tools

87
New cards

Involves recovering files and fragments of data from storage media without relying on file system metadata.

data carving

88
New cards

Involves creating a chronological sequence of events based on file access times, modification times, and other metadata.

timeline analysis

89
New cards

Ensures that the integrity of digital evidence is maintained, and its admissibility in court is upheld

chain of custody

90
New cards

Recording detailed information about a situation, actions taken, evidence collected, and analysis results

incident documentation

91
New cards

What is the significance of a "chain of custody" in Cyber Forensics?

integrity of digital evidence is maintained

92
New cards

Involves reviewing system and application logs to identify events, anomalies, and potential security breaches.

log analysis

93
New cards

Analysis involves examining artifacts left by operating systems, applications, and user activities

forensic artifact analysis

94
New cards

Involves examining the structure and contents of a storage device's file system to retrieve information about files, directories, timestamps, and access permissions.

file system analysis

95
New cards

Involves monitoring authentication logs, identifying failed login attempts, detecting patterns, and correlating events to uncover unauthorized access.

analyze network logs to detect unauthorized access attempts

96
New cards

A hardware or software tool used to prevent write access to storage media during evidence collection.

write-blocker

97
New cards

Involves extracting and analyzing the contents of a system's volatile memory to gather information about running processes, open files, and potential malware.

RAM analysis

98
New cards

Used for analysis without altering the original evidence

disk imaging

99
New cards

Why is "incident documentation" crucial in Cyber Forensics?

legal proceedings and accountability

100
New cards

Process of collecting, analyzing, and preserving digital evidence to investigate cybercrimes and incidents

cyber forensics