Term
|
Definition
anyone who attempts to gain access to unauthorized resources |
|
|
Term
|
Definition
unskilled programmer. they lack the ability to creat viruses or trojan programs on their own but can find programs online |
|
|
Term
|
Definition
computer attackers with political goals |
|
|
Term
|
Definition
when conditions are met it goes off example when a program opens or at a certain time |
|
|
Term
variation of a phishing attack sends phishing messages only to wealthy individuals |
|
Definition
|
|
Term
How can an attacker use a hoax? |
|
Definition
A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings |
|
|
Term
Linnea's father called her to say that a message suddenly appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before control of the computer will be returned to him. What type of malware is this? |
|
Definition
|
|
Term
Lykke receives a call while working at the helpdesk from someone who needs his account reset immediately. When Lykke questions the caller, he says, "If you don't reset my account immediately, I will call your supervisor!" What psychological approach is the caller attempting to use on Lykke? |
|
Definition
|
|
Term
What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments? |
|
Definition
|
|
Term
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use? |
|
Definition
|
|
Term
What is an objective of state-sponsored attackers? |
|
Definition
|
|
Term
Which tool is most commonly associated with nation state threat actors? |
|
Definition
Advanced Persistent Threat (APT) |
|
|
Term
Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users' needs. Which of these generally recognized security positions has Ian been offered? |
|
Definition
|
|
Term
Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information? |
|
Definition
Gramm-Leach-Bliley Act (GLBA) |
|
|
Term
Why do cyber-terrorists target power plants, air traffic control centers, and water systems? |
|
Definition
They can cause significant disruption by destroying only a few targets |
|
|
Term
Which of the following ensures that only authorized parties can view protected information? |
|
Definition
|
|
Term
Which of the following is an enterprise critical asset? |
|
Definition
|
|
Term
An organization that practices purchasing products from different vendors is demonstrating which security principle? |
|
Definition
|
|
Term
True or False? The biggest difference between a LAN and WAN is usually the size of the network. |
|
Definition
|
|
Term
The ___-___-___ network model offers no centralized storage of data or centralized control over the sharing of files or resources. |
|
Definition
|
|
Term
In a ___ network model, the processing power is shared between the client systems and the server. |
|
Definition
|
|
Term
Networks are classified according to their ___ ___ and ___. |
|
Definition
|
|
Term
The two most common networks are ___ ___ networks and ___ ___ networks . |
|
Definition
local area networks (LANs) wide area networks (WANs) |
|
|
Term
A LAN is a network restricted to how many geographic locations? |
|
Definition
|
|
Term
The function of the ___ ___ ___ is to interconnect workstation computers for sharing files and resources. |
|
Definition
|
|
Term
A ___ ___ ___ network wirelessly connects devices in close proximity. |
|
Definition
wireless personal area network (WPAN) |
|
|
Term
A ___ ___ network spans more than one geographic location, often connecting separated LANs. |
|
Definition
|
|
Term
A ___ ___ ___ is a WAN confined to a certain geographic area such as a university campus or city. |
|
Definition
Metropolitan Area Network (MAN) |
|
|
Term
A ___-___-___ network model offers no centralized storage of data or centralized control over the sharing of files or resources. |
|
Definition
|
|
Term
A general rule of thumb is to have no more than ___ computers connected to a peer-to-peer network. |
|
Definition
|
|