Package deal
CYSE 101 PACKAGE DEAL 2023 |GUARANTEED SUCCESS
CYSE 101 PACKAGE DEAL 2023 |GUARANTEED SUCCESS
[Show more]CYSE 101 PACKAGE DEAL 2023 |GUARANTEED SUCCESS
[Show more]Confidentiality 
Unauthorized users cannot access sensitive information. 
 
 
 
Integrity 
Information is complete and corrupted. 
 
 
 
 
 
 
00:03 
 
04:10 
Availability 
Authorized users can get to the information or resources. 
 
 
 
Vulnerability 
A flaw, weakness, or hole in a system or compon...
Preview 3 out of 18 pages
Add to cartConfidentiality 
Unauthorized users cannot access sensitive information. 
 
 
 
Integrity 
Information is complete and corrupted. 
 
 
 
 
 
 
00:03 
 
04:10 
Availability 
Authorized users can get to the information or resources. 
 
 
 
Vulnerability 
A flaw, weakness, or hole in a system or compon...
Cybersecurity countermeasures are: 
the tools and techniques we use to reduce risk 
 
 
 
One vulnerability in air traffic control system case was 
unauthenticated messages 
 
 
 
 
 
 
00:37 
 
04:10 
What does non-repudiation mean? 
suffuncent evidence exists such taht a user cannot deny an action...
Preview 2 out of 14 pages
Add to cartCybersecurity countermeasures are: 
the tools and techniques we use to reduce risk 
 
 
 
One vulnerability in air traffic control system case was 
unauthenticated messages 
 
 
 
 
 
 
00:37 
 
04:10 
What does non-repudiation mean? 
suffuncent evidence exists such taht a user cannot deny an action...
Vulnerability vs. Threat 
A vulnerability is a weakness that can be use to harm us, meanwhile a threat is an entity that seeks to exploit a weakness and harm us. 
 
 
 
Logical Controls 
• Passwords 
• Encrptions 
• Firewalls 
• Intrusion Detection Systems 
• Logical Access Controls 
 
 
 ...
Preview 2 out of 9 pages
Add to cartVulnerability vs. Threat 
A vulnerability is a weakness that can be use to harm us, meanwhile a threat is an entity that seeks to exploit a weakness and harm us. 
 
 
 
Logical Controls 
• Passwords 
• Encrptions 
• Firewalls 
• Intrusion Detection Systems 
• Logical Access Controls 
 
 
 ...
In a data breach (such as the OPM case) which security characteristic of data has been violated? 
Confidentiality 
 
 
 
Which of the following about vulnerabilities and threats is not true? 
A vulnerability or a threat, but not both, are required to create risk 
 
 
 
 
 
 
00:17 
 
04:07 
Consider...
Preview 2 out of 5 pages
Add to cartIn a data breach (such as the OPM case) which security characteristic of data has been violated? 
Confidentiality 
 
 
 
Which of the following about vulnerabilities and threats is not true? 
A vulnerability or a threat, but not both, are required to create risk 
 
 
 
 
 
 
00:17 
 
04:07 
Consider...
If we are using an 4-character password that contains only lowercase English alphabetic characters (26 different characters), how many more possible passwords are there if we use a 5-character password (still only lowercase English alphabetic characters? 
 
a. 11,424,400 more possibilities 
b. 26 mo...
Preview 2 out of 15 pages
Add to cartIf we are using an 4-character password that contains only lowercase English alphabetic characters (26 different characters), how many more possible passwords are there if we use a 5-character password (still only lowercase English alphabetic characters? 
 
a. 11,424,400 more possibilities 
b. 26 mo...
Which of the following about vulnerabilities and threats is not true? 
A vulnerability or a threat, but not both, are required to create risk 
 
 
 
Which of the following is not true about complex and automatically generated passwords that are unique to each system and are a minimum of 30 character...
Preview 2 out of 5 pages
Add to cartWhich of the following about vulnerabilities and threats is not true? 
A vulnerability or a threat, but not both, are required to create risk 
 
 
 
Which of the following is not true about complex and automatically generated passwords that are unique to each system and are a minimum of 30 character...
Considering the CIA triad and the Parkerian hexad, which of the following is true? 
Parkerian is more complete but not as widely known 
 
 
 
Salting a password 
makes it hard to guess by brute force 
 
 
 
Cybersecurity countermeasure are 
the tools and techniques we use to reduce risk 
 
 
 
Which...
Preview 1 out of 3 pages
Add to cartConsidering the CIA triad and the Parkerian hexad, which of the following is true? 
Parkerian is more complete but not as widely known 
 
 
 
Salting a password 
makes it hard to guess by brute force 
 
 
 
Cybersecurity countermeasure are 
the tools and techniques we use to reduce risk 
 
 
 
Which...
Which of the following would not be part of a solution in the Polycom case study? 
d. Off site backups 
 
 
 
Which of the following is not true about complex and automatically generated passwords that are unique to each system and are a minimum of 30 characters in length, such as !Hs4(j0qO$&zn1%2SK...
Preview 2 out of 13 pages
Add to cartWhich of the following would not be part of a solution in the Polycom case study? 
d. Off site backups 
 
 
 
Which of the following is not true about complex and automatically generated passwords that are unique to each system and are a minimum of 30 characters in length, such as !Hs4(j0qO$&zn1%2SK...
List a vector for malware propagation 
E-mail 
 
 
 
Exploit framework 
It is a category of sets of tools. Most provide a variety of tools such as network mapping tools, sniffers, etc. But one of the main tools we can find in exploit frameworks is the exploit. 
 
 
 
Exploit 
Small bits of software ...
Preview 2 out of 13 pages
Add to cartList a vector for malware propagation 
E-mail 
 
 
 
Exploit framework 
It is a category of sets of tools. Most provide a variety of tools such as network mapping tools, sniffers, etc. But one of the main tools we can find in exploit frameworks is the exploit. 
 
 
 
Exploit 
Small bits of software ...
How does a spear phishing attack differ from a general phishing attack? 
 
whether message has embedded javascript or not 
 
size of the message 
 
number of targets and custom messages 
 
whether message has malware attached or not 
number of targets and custom messages 
 
 
 
Is it OK to use the s...
Preview 3 out of 18 pages
Add to cartHow does a spear phishing attack differ from a general phishing attack? 
 
whether message has embedded javascript or not 
 
size of the message 
 
number of targets and custom messages 
 
whether message has malware attached or not 
number of targets and custom messages 
 
 
 
Is it OK to use the s...
Which of the following is true regarding the history of cybersecurity as presented in class and the associated document? 
Advances (firewalls, intrusion detection, encryption algorithms, etc.) often followed attacks or apparent weaknesses 
 
 
 
How do we know at what point we can consider our envir...
Preview 2 out of 11 pages
Add to cartWhich of the following is true regarding the history of cybersecurity as presented in class and the associated document? 
Advances (firewalls, intrusion detection, encryption algorithms, etc.) often followed attacks or apparent weaknesses 
 
 
 
How do we know at what point we can consider our envir...
Which algorithm does the value from the previous question (ans = 6) indicate your shadow file used? 
 
SHA-256 
 
SHA-512 
 
MD5 
 
Blowfish 
SHA-512 
 
 
 
Will salts be the same between both accounts? 
no 
 
 
 
 
 
 
00:42 
 
04:07 
What is a salt? 
salt is made up of random bits added to each pa...
Preview 2 out of 6 pages
Add to cartWhich algorithm does the value from the previous question (ans = 6) indicate your shadow file used? 
 
SHA-256 
 
SHA-512 
 
MD5 
 
Blowfish 
SHA-512 
 
 
 
Will salts be the same between both accounts? 
no 
 
 
 
 
 
 
00:42 
 
04:07 
What is a salt? 
salt is made up of random bits added to each pa...
What is the difference between a stateful packet filtering firewall and a basic packet filtering firewall? 
A stateful packet filtering firewall tracks sessions between systems 
 
 
 
For what might we use the tool Kismet? 
To detect wireless devices 
 
 
 
 
 
 
00:46 
 
04:07 
What tool mentioned ...
Preview 2 out of 12 pages
Add to cartWhat is the difference between a stateful packet filtering firewall and a basic packet filtering firewall? 
A stateful packet filtering firewall tracks sessions between systems 
 
 
 
For what might we use the tool Kismet? 
To detect wireless devices 
 
 
 
 
 
 
00:46 
 
04:07 
What tool mentioned ...
How many total tcp/tcp6 ports are listening? (count each row as one) 
7 
 
 
 
How many total udp/udp6 ports are listening (you won't see "LISTEN" by any of these)? (count each row as one) 
6 
 
 
 
The value after the last colon in the "Local Address" column is the port number; are the port nu...
Preview 1 out of 2 pages
Add to cartHow many total tcp/tcp6 ports are listening? (count each row as one) 
7 
 
 
 
How many total udp/udp6 ports are listening (you won't see "LISTEN" by any of these)? (count each row as one) 
6 
 
 
 
The value after the last colon in the "Local Address" column is the port number; are the port nu...
What Kismet used for? 
Finding wireless access points even when attempts have made it difficult to do so. 
 
 
 
What is the concept of network segmentation and why do it? 
Divide networks into subnets. 
Do this for controlling network traffic. 
Boost Performance. 
Troubleshooting network issues. 
 ...
Preview 2 out of 7 pages
Add to cartWhat Kismet used for? 
Finding wireless access points even when attempts have made it difficult to do so. 
 
 
 
What is the concept of network segmentation and why do it? 
Divide networks into subnets. 
Do this for controlling network traffic. 
Boost Performance. 
Troubleshooting network issues. 
 ...
What is access control? 
A security technique that regulates who or what can view or use resources in a computing environment 
 
It enables administrators to manage access at a more granular level 
 
 
 
Authentication 
Authentication is the step after identification 
 
It is to determine whether th...
Preview 4 out of 73 pages
Add to cartWhat is access control? 
A security technique that regulates who or what can view or use resources in a computing environment 
 
It enables administrators to manage access at a more granular level 
 
 
 
Authentication 
Authentication is the step after identification 
 
It is to determine whether th...
Cryptography is? 
The science of keeping information secure (confidentiality and integrity). 
 
 
 
Encryption is? 
A subset of cryptography, refers to the transformation of unencrypted data to encrypted data. 
 
 
 
Plaintext or cleartext is? 
Unencrypted data. (message) 
 
 
 
Ciphertext is? 
Encr...
Preview 1 out of 3 pages
Add to cartCryptography is? 
The science of keeping information secure (confidentiality and integrity). 
 
 
 
Encryption is? 
A subset of cryptography, refers to the transformation of unencrypted data to encrypted data. 
 
 
 
Plaintext or cleartext is? 
Unencrypted data. (message) 
 
 
 
Ciphertext is? 
Encr...
For what might we use the tool Kismet? 
You use the kismet tool in order to find and detect wireless devices. 
 
 
 
Explain the concept of segmentation and why it might be done. 
We divide a network into multiple smaller networks each acting as its own small network called a subnet. Here we can con...
Preview 2 out of 5 pages
Add to cartFor what might we use the tool Kismet? 
You use the kismet tool in order to find and detect wireless devices. 
 
 
 
Explain the concept of segmentation and why it might be done. 
We divide a network into multiple smaller networks each acting as its own small network called a subnet. Here we can con...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller GUARANTEEDSUCCESS. Stuvia facilitates payment to the seller.
No, you only buy these notes for $50.99. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
77254 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now