Types of Exploits
Types of Perpetrators
Implementing CIA, Organization Level
Implementing CIA, Network Level
Implementing CIA at the End-User-Level
Eradication and Incident Follow-Up:

100

True or False?

Worms differ from viruses in that they require human intervention to propagate.

What is false?

100

True or False? 

Hackers often test the limits of systems purely for intellectual curiosity or publicity.

What is true?

100

The process of assessing security related risks to an organization’s computer and networks from both internal and external threats.


What is risk assessment?

100

Multi Factor authentication schemes include? (Multiple correct answers.)

What are Biometrics? / What are one-time passwords?/ What are hardware tokens?

100

This security measure ensures that only authorized users can access a device or system by requiring a passcode or other verification method.

What is authentication?

100

Before starting eradication efforts, the IT security team must collect and log this type of evidence.

What is criminal evidence?

200

A __ is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

What is a virus?

200

What motivates malicious insiders?

What is gaining financially or disrupting operations?

200

Business processes that are more pivotal to continued operations and goal attainment than others.

What is mission-critical processes?

200

A networking device that connects multiple networks amd transmits data packets between networks.

What is a router?

200

This encryption method protects stored data on hard drives and storage devices, preventing unauthorized access if removed.

What is full-disk encryption?

200

During eradication, backups must be checked for these three qualities to ensure safe restoration.

What are current, complete, and free of malware?

300

What is a common goal of phishing scams?

What is to convince the recipient to provide personal or financial information

300

True or False?

Cyberterrorists aim to achieve financial gain through network-based attacks.

What is false? 

~Their goal is to intimidate for political or social objectives.

300

 An audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.

What is a security audit?

300

The process of scrambling messages or data in such a way that only authorized parties can read it.

What is encryption?

300

This component of antivirus software helps identify previously known viruses by detecting a specific sequence of bytes.

What is a virus signature?

300

This phase of incident follow-up determines how an organization’s security was compromised to prevent future incidents.

What is analyzing the cause of the security breach?

400

Which of the following best describes vishing?

a) Fraudulent phone calls attempting to gather sensitive information

b) Text messages designed to install malware

c) Email messages sent to a large number of recipients

d) Automated CAPTCHA tests used on websites

What is fraudulent phone calls attempting to gather sensitive information

400

True or False?

Smart cards can reduce the likelihood of online credit card fraud because they contain a memory chip that updates encrypted data.

What is true?

400

Provides a comprehensive display of all key performance indicators related to an organization’s security defenses.

What are security dashboards?

400

Enables remote users to securely access an organization’s computing resources and share data by transmitting and receiving encrypted data over public networks, such as the Internet.

What is a VPN?

400

This cybersecurity measure educates users on the importance of security so they follow security policies.

What is security education?

400

A formal incident report includes a detailed chronology of events and this key factor.

What is the impact of the incident?

500

The term botnet, also called___ is used to describe a large group of such computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.


What is zombies?



Hint: Apocalypse

500

What is hacktivism?


What is hacking for political or social goals?

500

Requires financial institutions in the United States to assist U.S. government agencies in detection and preventing money laundering.

What is the Bank Secrecy Law of 1970?

500

What are the two approaches to intrusion detection?

What is knowledge and behavior based?

500

This combination of security education, authentication methods, antivirus software, and data encryption helps protect end users by preventing unauthorized access, detecting threats, and securing data.

What is a multi-layered cybersecurity approach?

500

Proper incident follow-up helps organizations avoid repeat security breaches by implementing these.

What are preventative measures and security improvements?

M
e
n
u