Information Security Fundamentals Final Exam Study Guide
8 views 0 purchase
Course
Information .Security
Institution
Information .Security
Which password attack is typically used specifically against password files that contain cryptographic hashes? - Answer - Birthday Attacks
Brian notices an attack taking place on his network. When he digs deeper, he realizes that the attacker has a physical presence on the local network and is ...
INFORMATION SECURITY FUNDAMENTALS FINAL EXAM STUDY
GUIDE G eeka . Which password attack is typically used specifically against password files that contain cryptographic hashes? - Answer - Birthday Attacks
Brian notices an attack taking place on his network. When he digs deeper, he realizes that the attacker has a physical presence on the local network and is forging Media Access Control (MAC) addresses. Which type of attack is most likely taking place? - Answer - Address Resolution Protocol (ARP) poisoning
In which type of attack does the attacker attempt to take over an existing connection between two systems? - Answer - Session Hijacking
Which group is the most likely target of a social engineering attack? - Answer - Receptionists and administrative assistants
What type of malicious software masquerades as legitimate software to entice the user to run it? - Answer - Trojan
An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Which type of social engineering attack is the attacker using? - Answer - Urgency
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcasting the security set identifier (SSID) of an open network owned by the coffee shop in his lobby. Which type of attack is likely taking place? - Answer - Evil Twin
Which type of attack against a web application uses a newly discovered vulnerability that is not patchable? - Answer - Zero-day attack
Which control is not designed to combat malware? - Answer - Firewall
Florian recently purchased a set of domain names that are similar to those of legitimate websites and used the newly purchased sites to host malware. Which type of attack is Florian using? - Answer - Typosquatting
Which formula is typically used to describe the components of information security risks? - Answer - Risk = Threat X Vulnerability
Earl is preparing a risk register for his organization's risk management program. Which data element is LEAST likely to be included in a risk register? - Answer - Risk survey results
Alan is developing a business impact assessment for his organization. He is working with business units to determine the maximum allowable time to recover a particular function. What value is Alan determining? - Answer - Recovery time objective (RTO)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.