1/22
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
the CIA triad is made up of 3 security strategies to make up a security system
a. control , identity, authentication
b. confidentiality, integrity, availability
c. compliance, inspection, authorization
d. confidentiality, internet, authorization
confidentiality , integrity , availability
how does non-repudiation relate to the CIA triad? (confidentiality, integrity, availability)
a. non-repudiation replaces confidentiality in the CIA triad
b. non-repudiation is one of the three core components of the CIA triad
c. non-repudiation supports the CIA triad by providing proof of actions but is not art of it
d. non-repudiation ensures data is always accessible to users
non-repudiation supports the CIA triad by providing proof of actions but is not art of it
which factor determines whether a user can read, write, or execute a resource?
a. authentication
b. authorization
c. accounting
d. availability
authorization
an administrator uses windows even viewer to review audit logs containing thousands of recorder system events. Which security function is being performed
a. authentication
b. authorization
c. accounting
d. confidentiality
accounting (event viewer = logs ; audit logs = tracking activity ; tracking user/system actions = accounting)
what is social engineering?
a. exploiting software vulnerabilities to gain unauthorized system access
b. using encryption to protect sensitive data
c. exploiting people’s trust to manipulate them into reveling info or performing actions
d. monitoring system logs to track user activity
exploiting people’s trust to manipulate them into reveling info or performing actions
which type of malware attaches itself to legitimate files and requires user action to spread
a. worm
b. virus
c. trojan
d. spyware
virus
which type of malware can spread automatically across networks without user interaction
a. virus
b. trojan
c. worm
d. ransomware
worm
which type of malware disguises itself as legitimate or useful software to trick a user into installing it
a. worm
b. virus
c. trojan
d. spyware
trojan
which type of malware encrypts a user’s data and demands payment to restore?
a. spyware
b. backdoor
c. virus
d. ransomware
ransomware
which type of malware secretly monitors user activity and collects personal info
a. trojan
b. spyware
c. worm
d. ransomware
spyware
which type of malware creates hidden access to a system allowing attackers to bypass authentication?
a. virus
b. worm
c. backdoor
d. spyware
backdoor
which type of social engineering attack uses emails to trick users into revealing sensitive info?
a. smishing
b. vishing
c. phishing
d. spyware
phishing
which social engineering attack involves voice calls pretending to be a trusted authority
a. phishing
b. smishing
c. trojan
d. vishing
vishing
which type of social engineering attack uses SMS/text messages to manipulate victims
a. vishing
b. smishing
c. phishing
d. ransomware
smishing
which security tool or practice provides protection against all threat actors?
a. antivirus software
b. firewall
c. user security awareness training
d. intrusion detection system (IDS)
user security awareness training
what is the primary purpose of a firewall in cybersecurity
a. to encrypt data stored on a server
b. to monitor user login activity
c. to act as a barrier between the internet and a private network, allowing or blocking traffic based on rules
d. to detect and remove malware from a system
to act as a barrier between the internet and a private network, allowing or blocking traffic based on rules
what is the primary function of antivirus software?
a. to block all incoming network traffic
b. to encrypt sensitive data on a system
c. to detect prevent and remove malware such as viruses worms, trojans, spyware, and ransomware
d. to manage user permissions and access levels
to detect prevent and remove malware such as viruses worms, trojans, spyware, and ransomware
why is operating system patching important for system security
a. it removes unused user accounts
b. it blocks al incoming network traffic
c. it fixes security vulnerabilities and system bugs in the operating system
d. it encrypts all stored data
it fixes security vulnerabilities and system bugs in the operating system
what is the primary purpose of application patching and updates
a. to increase hardware performance
b. to prevent unauthorized physical access
c. to correct software flaws and reduce application security risks
d. to manage user permissions
to correct software flaws and reduce application security risks
what does patch management involve
a. installing antivirus software on individual systems
b. manually updating one system at a time
c. planning testing deploying, and tracking patches across systems
d. monitoring user activity logs
planning testing deploying, and tracking patches across systems
what does an effective cybersecurity plan do
a. makes computers run faster
b. protects info and privacy and keep systems working properly
c. stops all internet access
d. replaces antivirus software
protects info and privacy and keep systems working properly
which action helps keep you safe online
a. ignoring security warnings
b. identifying common security threats and using security tools
c. sharing passwords with others
d. turning off security software
identifying common security threats and using security tools
which action best helps secure your digital life
a. ignoring software updates
b. protecting your data, keeping software updated, and staying alert to cyber threats
c. using public Wi-Fi without protection
d. sharing passwords with trusted friends
protecting your data, keeping software updated, and staying alert to cyber threats