What is hardening? - answer The process of securing a system by reducing
vulnerabilities, removing unnecessary services, implementing security controls, and
following best practices to minimize the attack surface.
Defense-in-Depth/Layered Security - answer An approach that involves deploying
multiple layers of security controls and measures to protect systems and data. If one
layer is compromised, other layers can still provide protection.
What is a denial-of-service (DoS) attack? - answerAttacks aimed at rendering a
network, system, or service unavailable by overwhelming it with a flood of illegitimate
requests or excessive traffic.
What is a botnet? - answerNetworks of compromised computers controlled by a central
attacker, typically used for launching coordinated attacks, distributing spam, or
conducting DDoS attacks.
What is a man-in-the-middle (MitM) attack? - answerAttacks where an attacker
intercepts and alters communication between two parties without their knowledge. This
allows the attacker to eavesdrop, modify, or steal information.
Why does IoT technology pose a greater risk than other computing technology on a
network? - answerInternet of Things devices often lack robust security measures,
making them susceptible to attacks. Vulnerabilities in IoT devices can lead to
unauthorized access, data breaches, or control manipulation.
Which tool is used to provide a list of open ports on network devices? -
answerNmap/Zenmap
What is the most common goal of search engine optimization (SEO) poisoning? -
answerto increase web traffic to malicious sites
,A user is surfing the Internet using a laptop at a public WiFi cafe. What should be
checked first when the user connects to the public network? - answerif the laptop
requires user authentication for file and media sharing
Which protocol is used by the Cisco Cyberthreat Defense Solution to collect information
about the traffic that is traversing the network? - answerNetFlow
Any device that controls or filters traffic going in or out of the network is known as a
___________. - answerFirewall
Which tool can perform real-time traffic and port analysis, and can also detect port
scans, fingerprinting and buffer overflow attacks? - answerSnort
What is the best approach to prevent a compromised IoT device from maliciously
accessing data and devices on a local network? - answerPlace all IoT devices that have
access to the Internet on an isolated network.
What is that main function of the Cisco Security Incident Response Team? - answerTo
ensure company, system, and data preservation
Which technology creates a security token that allows a user to log in to a desired web
application using credentials from a social media website? - answerOpen Authentication
Which stage of the kill chain used by attackers focuses on the identification and
selection of targets? - answerReconnaissance
For what purpose would a network administrator use the Nmap tool? - answerDetection
and identification of open ports
What is the Nmap utility used for? - answerIt is an open source tool for scanning
vulnerabilities of systems and networks. It can identify open ports on a host.
What type of attack uses zombies? - answerDDoS
A medical office employee sends emails to patients about recent patient visits to the
facility. What information would put the privacy of the patients at risk if it was included in
the email? - answerPatient Records
Which two tools used for incident detection can be used to detect anomalous behavior,
to detect command and control traffic, and to detect infected hosts? - answerIntrusion
Detection System
and
NetFlow
, What is the IoT (internet of things) - answerThe connection of a broad array of physical
devices to the internet, enabling data collection and management via software.
Can include: Sensors and equipment
What is IMPACT? - answerThe international multilateral partnership against cyber
threats --
a global partnership of world governments, industries, and academia dedicated to
improving global capabilities when dealing with cyber threats.
What is meant by the term "Sniffing"? - answerWhen an attacker listens and captures
packets sent on neatwork at attempt to discover password
What is the Gramm-Leach-Bliley Act (GLBA)? - answer
What is the Sarbanes-Oxley Act? - answer
What is PCI DSS? - answer
What is the Electronic Communications Privacy Act (ECPA)? - answerAims to ensure
work place privacy and protects a range of electronic communications, such as email
and telephone conversation, from unauthorized interception, access, use, and
disclosure
What is the Computer Fraud and Abuse Act (CFAA) of 1986? - answerProhibits the
unauthorized access of computer systems. Knowingly accessing a government
computer without permission or accessing any computer used in or affecting interstate
or foreign commerce is a criminal offense.
The Privacy Act of 1974: - answer
The Freedom of Information Act (FOIA): - answer
What is FERPA (Family Education Rights and Privacy Act of 1974)? - answer
What is COPPA? - answerThe Children's Online Privacy Protection Act (COPPA) is a
law created to protect the privacy of children under 13. The Act was passed by the U.S.
Congress in 1998 and took effect in April 2000. COPPA is managed by the Federal
Trade Commission (FTC).
What is CIPA? - answerThe Children's Internet Protection Act (CIPA) requires that K-12
schools and libraries in the United States use Internet filters and implement other
measures to protect children from harmful online content as a condition for federal
funding.
What is VPPA? - answer
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R269,66. You're not tied to anything after your purchase.