NOCTI: Cybersecurity Fundamentals

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

A. phishing

The fraudulent practice of sending emails claiming to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, is also known as

A. phishing

B. white hat hacking

C. instant messaging

D. surfing

2
New cards

B. theft

When thieves steal your personal information to take over or open new accounts, file fake tax returns, rent or buy properties, or do other criminal things in your name, you have been a victim of identity ________

A. spamming

B. theft

C. surfing

D. encryption

3
New cards

C. making a one-to-one copy of all files

What is an important aspect of evidence gathering?

A. deleting log files

B. removing infected files from the system

C. making a one-to-one copy of all files

D. allowing users to resume work on a system

4
New cards

D. make a one-to-one copy of the disk

When performing forensic activities on a disk to see what kind of information it contains, the first step is to

A. install backup software on the disk

B. examine the hard drive content further

C. terminate the employee's employment immediately

D. make a one-to-one copy of the disk

5
New cards

D. low and the impact is extremely low

An organization can accept a risk and defer it if the risk is considered

A. high and the impact is extremely low

B. high and the impact is extremely high

C. low and the impact is extremely high

D. low and the impact is extremely low

6
New cards

C. data redundancy

Data in the cloud is backed up and stored across multiple servers in the world. This is an example of

A. decreased data capacity

B. increased data capacity

C. data redundancy

D. data degradation

7
New cards

B. risk mitigation

A company decides to apply updates to a software package immediately. Which type of risk management does this represent?

A. risk acceptance

B. risk mitigation

C. risk categorization

D. risk deferment

8
New cards

A. blacklisting

Restricting access to a website for a specific user group is known as

A. blacklisting

B. whitelisting

C. bluelisting

D. redlisting

9
New cards

B. Virtual Private Network (VPN)

What technology was developed to allow remote users and branch offices to access corporate applications and resources via secure encrypted connection?

A. Access Control Lists (ACL)

B. Virtual Private Network (VPN)

C. SONNET Ring

D. Integrated Digital Services Network (ISDN)

10
New cards

B. IP Address

A numerical label assigned to each device connected to a computer network or on the internet is known as

A. Port Address

B. IP Address

C. RARP

D. ARP

11
New cards

D. trojan horse

A trick or stratagem that causes a target to invite a foe into a securely protected area, typically in the form of a malicious computer program which tricks users into willingly running it is called a/an ________

A. little worm

B. anti-virus

C. whale phishing

D. trojan horse

12
New cards

D. substitution cipher

In a cipher, when each letter represents a different letter, the cipher is called a

A. monolithic cipher

B. polyalphabetic cipher

C. static cipher

D. substitution cipher

13
New cards

D. transposition cipher

When a cipher rearranges the letters in a message, it is called a

A. monolithic cipher

B. substitution cipher

C. cryptogram

D. transposition cipher

14
New cards

A. cryptography

When creating a secret message, the use of a transposition cipher to create that message is called

A. cryptography

B. steganography

C. cartography

D. stenography

15
New cards

D. symmetric encryption

When the same key is used for encryption and decryption, the process is known as

A. transposition encryption

B. asymmetric encryption

C. block encryption

D. symmetric encryption

16
New cards

C. use different passwords for each account

To ensure the safety of user accounts and web applications, a user should

A. change their password every 10 days

B. use upper case and lower case letters

C. use different passwords for each account

D. store passwords under their keyboard

17
New cards

B. anti-virus software

Which one of the following can protect a computer from the risk of unwanted emails?

A. anti-spam software

B. anti-virus software

C. anti-spyware software

D. PC diagnostic software

18
New cards

A. signatures

Anti-virus software looks at the beginning and end of executable files for known virus

A. signatures

B. portfolios

C. images

D. autographs

19
New cards

B. Confidentiality, Integrity, Availability

The CIA of information security consists of

A. Confidentiality, Initiative, Availability

B. Confidentiality, Integrity, Availability

C. Confidentiality, Integrity, Attack

D. Controls, Integrity, Availability

20
New cards

B. least privilege

When someone is assigned only the rights and privileges necessary to do his/her job, this is referred to as

A. controlled access

B. least privilege

C. administrator privilege

D. super user

21
New cards

D. Zero Day

An exploit that is found or used before it is known to exist by the software maker is known as

A. phishing

B. DDOS

C. whaling

D. Zero Day

22
New cards

B. man trap

A type of access control that does not require a computer is a/an

A. access control list

B. man trap

C. authorization

D. biometrics

23
New cards

C. as one of the first steps after installation

Applying OS updates and patches to a newly installed operating system should be done

A. when the technician has time

B. when the client has time

C. as one of the first steps after installation

D. after the system is in use by the client

24
New cards

D. patch

When a software company releases fixes for specific security vulnerabilities and/or bugs in their program, it is known as a

A. program update

B. firmware update

C. feature update

D. patch

25
New cards

C. whaling

A phishing attack that targets a high-profile employee to obtain information is an example of

A. shoulder surfing

B. tailgating

C. whaling

D. man trap

26
New cards

D. Access Control Lists (ACL)

Restricting a user's or group's ability to read, write, and execute files in an OS can be controlled by

A. strong passwords

B. biometics

C. firewalls

D. Access Control Lists (ACL)

27
New cards

B. smart card

Which of the following is an example of the authentication method, something the user will have?

A. PIN

B. smart card

C. thumbprint

D. signature

28
New cards

B. authentication

Which of the following allows a user to access a computer system using credentials such as a password?

A. identification

B. authentication

C. authorization

D. accounting

29
New cards

C. eye

Iris and retinal patterns are an example of ______ recognition.

A. voice

B. facial

C. eye

D. fingerprint

30
New cards

B. physical

Facial recognition is an example of _______ biometric technology.

A. cognitive

B. physical

C. behavioral

D. identification

31
New cards

D. biometric reader

What is the best physical security to use in a data center to secure the servers?

A. CCTV

B. safe

C. sign-in and sign-out sheet

D. biometric reader

32
New cards

B. tough to enforce

Laws and procedures used for cell phones, PDAs, and cybersecurity are

A. well-established

B. tough to enforce

C. on the law books

D. in the law library

33
New cards

D. encryption

Which procedure converts plain text into symbols?

A. de-encryption

B. hashing

C. de-hashing

D. encryption

34
New cards

A. first responders

To prevent the alteration of digital evidence during collection, who should first document any activity on the computer, devices, or components?

A. first responders

B. supervisor

C. security

D. CEO

35
New cards

C. chain of custody

The ______ must show access to, storage, and transportation of the evidence from the crime scene to the courtroom.

A. timeline

B. criminal investigator

C. chain of custody

D. computer forensic investigator