Questions And Answers With Correct
Solutions 2024
Confidentiality .- .correct .answer.Ensures .the .secret .information .is .protected .from
.unauthorized .disclosure.
Integrity .- .correct .answer.Data .or .information .in .your .system .is .maintained .so .it .is .not
.modified .or .deleted .by .3rd .parties.
Availability .- .correct .answer.Systems .and .data .are .available .to .users .no .matter .what
.circumstances, .like .a .power .outage .or .natural .disaster.
Authenticity .- .correct .answer.Assurance .that .the .message, .transaction, .or .other
.exchange .of .information, .is .from .the .source.
Non-repudiation .- .correct .answer.Assurance .that .the .sender .of .information .is .provided
.with .proof .of .delivery .and .the .recipient .is .provided .with .proof .of .sender's .identity. .This .is
.so .neither .can .later .deny .having .processed .the .information.
Identification .- .correct .answer.The .ability .to .uniquely .identify .a .user .or .an .application .that
.is .running .in .the .system.
Authentication .- .correct .answer.Who .wants .access .to .the .network?
Authorization .- .correct .answer.What .is .the .user .allowed .to .access?
Accounting .- .correct .answer.What .did .the .user .do .in .the .network?
Abend .- .correct .answer.An .unexpected .or .abnormal .termination .of .an .application .or
.operating .system .that .results .from .a .problem .with .the .software.
Clone-in .Attacks .- .correct .answer.Someone .who .attempts .to .enter .a .device, .data, .or
.systems .in .a .physical .manner.
,Distribution .Attacks .- .correct .answer.A .malicious .attack .on .a .network .resource .that
.prevents .legitimate .users .from .accessing .the .resource. .This .is .typically .initiating .an
.overwhelming .number .of .spurious .requests .for .service.
Defensive .Warfare .- .correct .answer.Deploys .a .proactive .approach .to .security .through .the
.use .of .ethical .hacking.
Offensive .Warfare .- .correct .answer.Uses .a .reactive .approach .to .security .that .focuses .on
.detection, .prevention, .and .response .to .attacks.
Cyber .Kill .Chain .- .correct .answer.Outlines .the .various .stages .of .several .common
.cyberattacks. .By .extension .these .are .also .points .at .which .the .information .security .team
.can .detect, .prevent, .and .intercept .attacks. .These .points .consist .of:
1) .Reconnaissance
2) .Weaponization
3) .Delivery
4) .Exploitation
5) .Installation
6) .Command .& .Control
7) .Action .on .Objective
Black .Hat .Hacker .- .correct .answer.An .individual .who .breaks .into .computer .networks .with
.malicious .intent.
White .Hat .Hacker .- .correct .answer.An .individual .who .uses .hacking .skills .to .identify
.security .vulnerabilities .in .hardware, .software, .or .networks.
Gray .Hat .Hacker .- .correct .answer.An .individual .who .may .sometimes .violate .laws .or
.typical .ethical .standards, .but .usually .does .not .have .the .malicious .intent .typical .of .a .black
.hat .hacker
Black-Box .Testing .- .correct .answer.A .method .of .software .testing .that .examines .the
.functionality .of .an .application .without .peering .into .its .internal .structures .or .workings.
White-Box .Testing .- .correct .answer.A .method .of .software .testing .where .the .hacker .has
.full .knowledge .of .the .system .being .attacked.
Gray-Box .Testing .- .correct .answer.A .method .of .software .testing .where .it .uses .a
.combination .of .white-box .testing .and .black-box .testing.
Hacktivist .Hacker .- .correct .answer.Using .hacking .as .a .form .of .civil .disobedience .to
.promote .a .political .agenda .or .social .change.
Suicide .Hacker .- .correct .answer.Ready .and .willing .to .perform .an .attack .for .a ."cause",
.even .if .they .get .caught .and .prosecuted.
, Hack .Value .- .correct .answer.The .notion .used .by .hackers .to .express .that .something .is
.worth .doing .or .interesting.
Passive .Reconnaissance .- .correct .answer.An .attempt .to .gain .information .about .targeted
.computers .and .networks .without .actively .engaging .with .the .system.
Active .Reconnaissance .- .correct .answer.A .type .of .computer .attack .in .which .an .intruder
.engages .with .the .targeted .system .to .gather .information .about .vulnerabilities.
Information .Assurance .- .correct .answer.Managing .risks .related .to .the .use, .processing,
.storage, .and .transmission .of .information.
Defense .in .Depth .- .correct .answer.Concept .used .in .information .security .in .which .multiple
.layers .of .security .controls .are .placed .throughout .an .information .technology .system.
Threat .- .correct .answer.Exploits .a .vulnerability .and .can .damage .or .destroy .an .asset.
Risk .- .correct .answer.Refers .to .the .potential .for .lost, .damaged, .or .destroyed .assets
Vulnerability .- .correct .answer.A .weakness .in .your .hardware, .software, .or .procedures
Cyber .Threat .Intelligence .- .correct .answer.The .knowledge, .skills, .and .experience-based
.information .concerning .the .occurrence .and .assessment .of .both .cyber .and .physical
.threats .and .threat .actors. .This .information .is .intended .to .help .mitigate .potential .attacks
.and .harmful .events .occurring .in .cyberspace.
Competitive .Intellegence .- .correct .answer.The .process .that .involves .gathering,
.analyzing, .and .distribution .of .information .about .products, .customers, .competitors, .and
.technologies .using .the .internet.
Threat .Modeling .- .correct .answer.A .structured .process .with .the .following .objectives:
- .Identify .security .requirements
- .Pinpoint .security .threats .and .potential .vulnerabilities
- .Quantify .threat .and .vulnerability .critically
- .Prioritize .remediation .methods
Deep .Web .- .correct .answer.Sites .and .services .that .are .not .indexed .by .search .engines
Dark .Web .- .correct .answer.World .wide .web .content .that .exists .on .darknets: .overlay
.networks .that .use .the .Internet .but .require .specific .software, .configurations, .or
.authorization .to .access.
Eavesdropping .- .correct .answer.The .interception .of .communication .between .two .parties
.by .a .malicious .third .party.