Cybersecurity Capstone Quiz Review Notes

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

Flashcards covering insider threats, brokers, nation-state tactics, risk frameworks (NIST RMF/CSF), threat vectors, common vulnerabilities, and core security principles based on the provided lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

What term describes a serious threat to an enterprise that comes from its own employees, contractors, and business partners who are in positions of trust?

Insider threat.

2
New cards

A work-study student uses privileged access to change a grade after gaining additional privileges. What type of threat scenario does this illustrate?

Insider threat (abuse of privileged access by someone in a trusted position).

3
New cards

What is a vulnerability broker?

Someone who discovers vulnerabilities and sells information about them to attackers or governments rather than reporting to the vendor.

4
New cards

Why do nation-state attackers continue attempting targets until successful?

They have significant resources and a targeted objective, so they persist and adapt until they breach the target.

5
New cards

What activity is a vulnerability broker most likely to engage in after finding a weakness?

Sell information about the discovered vulnerability to the highest bidder (attackers or governments) rather than reporting it to the vendor.

6
New cards

If a nation-state attack against a target is not successful, what is their typical next step?

Continue attacking and persist until successful.

7
New cards

A modular router is approaching end-of-life (EOL). What should the company do to maintain security?

Update the router firmware to patch known threats (and replace hardware as needed when EOL approaches).

8
New cards

What are the primary responsibilities of a security administrator versus a security manager?

Security administrator manages daily security technology operations and may design security solutions; security manager oversees staff and enforces security policies and governance.

9
New cards

When an attacker hacks a cell phone to steal credit card information and spreads the attack to the victim’s contacts, which target category are they focusing on?

An individual (person) as the victim.

10
New cards

What category of targets focuses on individuals as victims, often involving personal data and financial information?

Targets focused on individuals (people) rather than organizations.

11
New cards

What does a zero-day vulnerability mean?

A vulnerability unknown to the vendor with no patch available yet; zero days of warning.

12
New cards

What term describes unskilled attackers who use readily available attack tools to breach defenses?

Script kiddies.

13
New cards

What are the five functions of the NIST Cybersecurity Framework (CSF)?

Identify, Protect, Detect, Respond, Recover.

14
New cards

How does the NIST Risk Management Framework (RMF) differ from the CSF in scope?

RMF is a risk management framework focusing on risk assessment, authorization, and ongoing monitoring; CSF is a framework to improve cybersecurity practices across Identify, Protect, Detect, Respond, Recover.

15
New cards

Text messages (SMS) fall under which threat vector category?

Specialized threat vector: Specialized communications (SMS).

16
New cards

Which vulnerabilities are associated with misconfiguration (default settings, open ports/services, and unsecure protocols)?

Misconfiguration vulnerabilities.

17
New cards

Why is Telnet considered insecure in network devices?

Telnet traffic is unencrypted, making credentials and data easy to capture.

18
New cards

Disclosing stolen credit card information is an example of which data security principle?

Confidentiality breach (loss of data confidentiality).

19
New cards

What are the three components of the CIA triad?

Confidentiality, Integrity, Availability.

20
New cards

How do cybersecurity and information security differ at a high level?

Cybersecurity focuses on protecting electronic systems, networks, and data; information security is the broader umbrella covering people, processes, and technology to protect information in all forms.

21
New cards

What is end-of-life (EOL) in hardware management?

Hardware that has reached the end of its manufacturing lifespan should be retired and replaced with a newer model.