Term
|
Definition
| anyone who attempts to gain access to unauthorized resources |
|
|
Term
|
Definition
| unskilled programmer. they lack the ability to creat viruses or trojan programs on their own but can find programs online |
|
|
Term
|
Definition
| computer attackers with political goals |
|
|
Term
|
Definition
| when conditions are met it goes off example when a program opens or at a certain time |
|
|
Term
| variation of a phishing attack sends phishing messages only to wealthy individuals |
|
Definition
|
|
Term
| How can an attacker use a hoax? |
|
Definition
| A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings |
|
|
Term
| Linnea's father called her to say that a message suddenly appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before control of the computer will be returned to him. What type of malware is this? |
|
Definition
|
|
Term
| Lykke receives a call while working at the helpdesk from someone who needs his account reset immediately. When Lykke questions the caller, he says, "If you don't reset my account immediately, I will call your supervisor!" What psychological approach is the caller attempting to use on Lykke? |
|
Definition
|
|
Term
| What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments? |
|
Definition
|
|
Term
| Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use? |
|
Definition
|
|
Term
| What is an objective of state-sponsored attackers? |
|
Definition
|
|
Term
| Which tool is most commonly associated with nation state threat actors? |
|
Definition
| Advanced Persistent Threat (APT) |
|
|
Term
| Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users' needs. Which of these generally recognized security positions has Ian been offered? |
|
Definition
|
|
Term
| Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information? |
|
Definition
| Gramm-Leach-Bliley Act (GLBA) |
|
|
Term
| Why do cyber-terrorists target power plants, air traffic control centers, and water systems? |
|
Definition
| They can cause significant disruption by destroying only a few targets |
|
|
Term
| Which of the following ensures that only authorized parties can view protected information? |
|
Definition
|
|
Term
| Which of the following is an enterprise critical asset? |
|
Definition
|
|
Term
| An organization that practices purchasing products from different vendors is demonstrating which security principle? |
|
Definition
|
|
Term
True or False? The biggest difference between a LAN and WAN is usually the size of the network. |
|
Definition
|
|
Term
| The ___-___-___ network model offers no centralized storage of data or centralized control over the sharing of files or resources. |
|
Definition
|
|
Term
| In a ___ network model, the processing power is shared between the client systems and the server. |
|
Definition
|
|
Term
| Networks are classified according to their ___ ___ and ___. |
|
Definition
|
|
Term
| The two most common networks are ___ ___ networks and ___ ___ networks . |
|
Definition
local area networks (LANs) wide area networks (WANs) |
|
|
Term
| A LAN is a network restricted to how many geographic locations? |
|
Definition
|
|
Term
| The function of the ___ ___ ___ is to interconnect workstation computers for sharing files and resources. |
|
Definition
|
|
Term
| A ___ ___ ___ network wirelessly connects devices in close proximity. |
|
Definition
| wireless personal area network (WPAN) |
|
|
Term
| A ___ ___ network spans more than one geographic location, often connecting separated LANs. |
|
Definition
|
|
Term
| A ___ ___ ___ is a WAN confined to a certain geographic area such as a university campus or city. |
|
Definition
| Metropolitan Area Network (MAN) |
|
|
Term
| A ___-___-___ network model offers no centralized storage of data or centralized control over the sharing of files or resources. |
|
Definition
|
|
Term
| A general rule of thumb is to have no more than ___ computers connected to a peer-to-peer network. |
|
Definition
|
|