Computer Science 110: Introduction to Cybersecurity

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/162

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

163 Terms

1
New cards

Which method works like an antivirus program?

Signature-based approach

2
New cards

Which is NOT a follow-up step once your business disaster recovery plan is created?

Distribute the plan to media, so they know how the company will handle disasters.

3
New cards

Which tool looks for abnormal activity?

Anomaly detection systems

4
New cards

Anti-virus software can find and remove _____ from your computer system.

Malware

5
New cards

After a catastrophe, _____ disaster plan(s) are often needed to recover.

multiple

6
New cards

Which of the following teams initiates, controls and ends a disaster recovery process in an organization?

The Disaster Management Team

7
New cards

When considering data recovery options, what is another factor organizations may have to consider?

Privacy and other laws that may affect the data

8
New cards

Social engineers use the same methods as _____, except they use technology.

Con men

9
New cards

Which of the following is NOT a threat/risk associated with social media?

Hardware failure

10
New cards

Which type of social engineering method might involve a college website that has been targeted and hacked, leaving behind malicious code that will execute when the page is loaded?

Watering Hole

11
New cards

When Angela buys a new smartphone that uses retina scanning instead of a password, the phone is using _____ security.

biometric

12
New cards

Which of these is a way to take a preventative measure against malware?

Keeping your operating system up to date

13
New cards

What is a computer virus?

It is malicious code that had been designed to replicate itself in its host causing system disruptions, instability, unauthorized modifications, or disability of core functions and processes.

14
New cards

The first computer virus developed was the _____.

Creeper Program

15
New cards

_____ is a type of malware that may cause pop-up advertisements to appear outside the web browser.

Adware

16
New cards

Which of the following might be a victim of a white collar crime?
I. Individuals
II. Corporations
III. Charities

I, II, and III

17
New cards

Which of the following activities is not common with hacking?

Sharing personal information with another person

18
New cards

On a website that calls for you to enter your financial information the URL should include what letter after the http?

s

19
New cards

Identity theft is a tactic used by cyber criminals for the purpose of gaining _____ information.

personal or sensitive

20
New cards

The TJ Maxx hack was due to:

an SQL injection that allowed theft of data following a WEP crack

21
New cards

Computer software is _____.

programming code executed on a computer processor

22
New cards

What is a failed test?

The actual results do not match the expected results

23
New cards

In programming, the requirements phase is:

the phase that highlights what the program should do.

24
New cards

In cryptography, checksums are used to _____.

verify the integrity of data

25
New cards

Encryption is based on _____.

Cryptography

26
New cards

An encryption key is similar to a:

password

27
New cards

Encryption strength is a measure of:

The encryption's ability to resist brute force attacks.

28
New cards

What is a limitation of EaseUS?

The free version of EaseUS data recovery tool only allows you to scan for lost and deleted files. In order to fully recover the data for use, you would need to purchase the full version.

29
New cards

Computer forensic experts work with two primary types of data. What are they?

Visible and latent.

30
New cards

Which of the following is not an EnCase certification track?

CFCE

31
New cards

Examples of digital forensic tools include _____.

Disk Investigator, Digital Detective, EnCase and ComputerCOP

32
New cards

Which of the following is NOT described by an information security model?

Processing Power

33
New cards

Requiring users to change their passwords is an example of a(n) _____ security policy?

Technological.

34
New cards

The main reason for using an information security framework are as follows _____

-Ensuring legal compliance with the country of operation's Data Protection Act
-Protect the entire firm from network security breaches and invariably, company's data breach
-Assure customers and clients of their personal data safety and privacy

35
New cards

The purpose of a Business Continuity Plan Policy is to _____

help ensure the company does not collapse due to loss of critical data or disaster

36
New cards

You can quickly access a program or storage location with which of the following?

A shortcut

37
New cards

Which software is used to process instructions and coordinate between devices?

Operating system

38
New cards

Computer security is:

the maintenance of system integrity, availability and confidentiality at all times

39
New cards

How has the Internet of Things prompted new concerns over security issues?

Devices are not compatible with traditional security measures.

40
New cards

Many businesses today have changed their approach to marketing in all of the following ways EXCEPT:

They rely on employees to drive sales.

41
New cards

Instant messaging platforms are common among cyber criminals for all of the following reasons EXCEPT which?

They are less secure.

42
New cards

Which of the following is TRUE about how flawed computer software aids the execution of a Cyber Attack?

Flawed software provides an entry point by which malware extracts information of interest to the attacker.

43
New cards

How is spam email used in cybercrimes?

By tricking recipients into download viruses onto their device.

44
New cards

_____ is anything that can negatively affect information.

An information security threat.

45
New cards

Which of the following best describes confidentiality as it relates to information security?

Preventing unauthorized users from accessing information

46
New cards

What is NOT an example of physical security?

Encrypting email messages

47
New cards

What are the three principles of the information security CIA triad?

Confidentiality, Integrity, Availability

48
New cards

What is an IDS?

An application that monitors a network for malicious activity

49
New cards

Which of the following is a strategy supported by vendors for data recovery?

Vendor provides support for replication and recovery testing

50
New cards

AES uses a blocking size of?

128 bits

51
New cards

Cryptography is used to conceal data in transmission by the use of _____.

encryption

52
New cards

What is a symmetric encryption?

There is only a shared key.

53
New cards

What was the name of the cryptographic rotor machine used by the Germans in World War II?

The Enigma machine

54
New cards

Encrypt the following message using a Caesar cipher with a shift of 7: ET TU BRUTE

LA AB IYBAL

55
New cards

What is a one-way function in cryptography?

A mathematical combination of keys that is easy to create, but difficult to undo.

56
New cards

Fire is an example of a _____ information security threat.

Physical.

57
New cards

What type of testing is performed immediately before deployment?

Formal Acceptance Testing

58
New cards

When working to find secure programming methodologies, programmers should:

use a knowledge management base to avoid known pitfalls and have appropriate libraries against improper coding practices.

59
New cards

The _____ development process demonstrates the relationship between each early phase of development and the associated testing phase.

V-model

60
New cards

What is the purpose of the Internet of Things?

To create connections between devices, human and data.

61
New cards

Which policy informs users on how to handle an organization's confidential or sensitive information?

Information Security Policy

62
New cards

Which policy includes both the incident response policy and the disaster recovery plan?

Business Continuity Plan

63
New cards

The rise in the use of cell phones to commit cybercrimes could be attributed to all of these factors EXCEPT which?

They are more secure than other devices.

64
New cards

Eric has received a Facebook message from someone he recognizes as a friend, asking him to click a link to view a video. What should Eric do?

Verify the origins.

65
New cards

How do cyber criminals often make emails look more legitimate to trick their recipients?

By slightly changing the email address.

66
New cards

Which of these is NOT text-based?

Video conferencing

67
New cards

What is perhaps the most essential strategy in IT disaster recovery plans?

having data backups

68
New cards

Maintaining IT disaster recovery master copies, offsite copies and plans are the responsibilities of the _____.

Recovery Coordinators

69
New cards

What is a business disaster recovery plan?

A document that specifies exactly what should happen to minimize the impact and return the company to working order as quickly as possible after a disaster occurs that impacts the company

70
New cards

What is the cloud in the context of the internet and data?

series of offsite servers

71
New cards

Cybercriminals tend to share some similar characteristics. Which of these could that be?

They are tech savvy.

72
New cards

Investigators of cybercrimes must possess objectivity, inquisitiveness and knowledge of _____.

Digital security issues.

73
New cards

This role on a cybersecurity team is tasked with thinking like a hacker to help thwart cybercrimes before they happen.

Threat Intelligence Specialist

74
New cards

The latest password security standards call for at least how many characters in a password?

Eight

75
New cards

Which of the following is a characteristic of cyber crime?

-Is an offense
-Affects a computer (or more than one)
-A computer is the primary instrument of the offense

76
New cards

Piracy committed by technocriminals using satellite dish equipment involves which of the following?

Illegally accessing radio or television signals

77
New cards

Which of the following terms describes the practice of attempting to acquire sensitive information with deceptive emails?

Phishing

78
New cards

What is the first step described in this lesson that you can take to remove a computer virus?

Boot into Safe Mode

79
New cards

Which of the following makes a virus different from a worm?

A virus requires human intervention to spread.

80
New cards

What is one of the differences between a virus and a worm?

A worm is self-replicating.

81
New cards

Which of these is an indication of slow performance that may signal that a phone is infected with malware?

A phone crashing frequently

82
New cards

Which of the following is NOT determined by information security model governance?

The layout of the technologies

83
New cards

Set of framework policy documents created to guide the enforcement of measures protecting information and data of an organization from unauthorized access, sharing, loss or damage is called _____

Information Security Policy Document

84
New cards

What is phishing?

Attempting to get users to visit a fake website that masks itself as the real one.

85
New cards

An example of an information security policy document consists of the following components

Policy Name
Purpose
Policy ID

86
New cards

Which of the following attacks involves cyber criminals exploiting vulnerabilities that are not yet known to the general public and which do not have any defenses implemented yet?

Zero-Day

87
New cards

E-Mail spoofing is defined as _____

the process of manipulating the contents of an email in a way that makes the email appear to originate from a source other than the actual sender

88
New cards

Which of the following approach refers to the method of handling the occurrence of a digital crime after it has already happened?

Reactive approach

89
New cards

The main difference between the POP and IMAP e-mail protocols is that _____.

with POP emails are only accessed from the download device while with IMAP emails can be accessed from any device anywhere

90
New cards

What does anti-ransomware software protect your system from?

Your computer or network from being hijacked.

91
New cards

_____ can affect both individuals and companies regardless of size, industry, or value for the purpose of performing malicious acts.

Cybercrime

92
New cards

_____ is a tool used for examining the contents of a device in a secure manner?

Forensics Tool Kit (FTK)

93
New cards

Which phase below describes the process of ensuring operations have returned to a secure normal state?

Recovery

94
New cards

What kind of keys are there in an asymmetric encryption?

Public and Private

95
New cards

Information security must _____, and protect against, all threats.

Recognize.

96
New cards

Digital Detective tool offers experts _____.

no certification track

97
New cards

Which of the following best describes a proactive approach to digital crime?

It refers to actively searching for the clues that typically precede an attack in an effort to prevent the crime from taking place.

98
New cards

From the given options, which is the cause of the renewed challenges facing security practitioners today?

Earth's population growth and rise in the number of people using digital devices

99
New cards

Which of the following best defines what a cipher is?

It is the secret code used to encrypt data.

100
New cards

Information security policy documents include _____

Business Continuity Plan Policy
Remote Access Policy
Disaster Recovery Plan Policy