What type of attack can disable a computer by forcing it to use memory or by overworking its CPU

What type of attack can disable a computer by forcing it to use memory or by overworking its CPU

The entire information for quizzes answers shares below. Go through each part to get answers. I hope this will be helpful. 


Practice Quiz
Chapter 1 Quiz

1. Pick three types of records that cybercriminals would be interested in stealing from organizations. (Choose three.)
Answer: 

2. What does the acronym IoE represent? -   

3. What name is given to hackers who hack for a cause? -   

4. What does the term vulnerability mean? - 

a weakness that makes a target susceptible to an attack

 

5. What is an example of an Internet data domain? - LinkedIn

6. What does the term BYOD represent? -   

7. What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence? -   

8. Thwarting cybercriminals includes which of the following? (Choose two.)

sharing cyber Intelligence information

 

establishing early warning systems

9. What type of attack can disable a computer by forcing it to use memory or by overworking its CPU? -   

10. What name is given to an amateur hacker? -   

11. What type of attack uses many systems to flood the resources of a target, thus making the target unavailable? -   


eliminate single points of failure, provide for a reliable crossover, detect failures as they occur

something you know, something you have, something you are

  • integrity
  • availability
  • confidentiality


  • authorization
  • accounting
  • authentication

  -  data consistency checks, hashing

  • defines legal consequences of violations
  • gives security staff the backing of management
  • sets rules for expected behavior

  • up-to-date operating systems
  • equipment maintenance

  • at rest
  • in-transit
  • in-process

  • The key is static and repeats on a congested network.
  • The key is transmitted in cleartext.

Worms self-replicate but viruses do not.

a malicious program that uses a trigger to awaken the malicious code

  • Use antivirus software.
  • Keep software up to date.

  • The email has misspelled words or punctuation errors or both.
  • The email has no subject line.

  • swipe cards
  • locks
  • video cameras

  • firewalls to monitor traffic
  • intrusion detection system (IDS) to watch for suspicious network activity
  • biometrics to validate physical characteristics

  • hiring practices
  • policies and procedures
  • background checks

  • Secure Shell (SSH)
  • Pretty Good Privacy (PGP)
  • Secure Sockets Layer (SSL)

  • a security key fob  ————> something you have
  • a fingerprint scan  ————> something you are
  • a password           ————> something you know

  • steganography —————> hiding data within an audio file
  • steganalysis ——————> discovering that hidden information exists within a graphic file
  • social steganography ——–> creating a message that says one thing but means something else to a specific audience
  • obfuscation ——————> making a message confusing so it is harder to understand

  • It is a one-way function and not reversible.

  • secret key and message digest

  • The data in the image is an exact copy and nothing has been altered by the process.

  • lookup tables
  • reverse lookup tables
  • rainbow tables

  • Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.

  • The site is not using a digital certificate to secure the transaction, with the result that everything is in the clear.

  • A salt should not be reused.
  • A salt must be unique.
  • A salt should be unique for each password

  • Create a message digest; encrypt the digest with the private key of the sender; and bundle the message, encrypted digest, and public key together in order to sign the document.

  • Where does the individual perform the process?
  • Who is responsible for the process
  • What is the process?

  • Identify the sensitivity of the data.
  • Establish the owner of the data

  • single points of failure
  • failure to detect errors as they occur
  • failure to design for reliability

  • public safety
  • finance
  • healthcare

  • hardware network devices
  • workstations
  • operating systems

  • Administrators can approve or deny patches.
  • Updates can be forced on systems immediately.
  • Updates cannot be circumvented

  • mandatory use of AES algorithms

  • virus
  • Trojan horse
  • keylogger

  • no opportunities for users to circumvent updates
  • the ability to obtain reports on systems
  • the ability to control when updates occur

  • can provide a full system backup
  • easier to deploy new computers within the organization
  • ensures a clean imaged machine

  • An HIDS monitors operating systems on host computers and processes file system activity. Firewalls allow or deny traffic between the computer and other systems.

  • Remove unnecessary programs and services.

  • Enforce the principle of least privilege.
  • Secure password storage.
  • Reduce the number of privileged accounts.

  • a misconfigured firewall
  • unauthorized port scanning and network probing
  • unlocked access to network equipment

  • Disable administrative rights for users.
  • Enable automated antivirus scans.
  • Enable screen lockout.

  • develop tools, products, and methods to analyze vulnerabilities
  • develop tools, products, and methods to conduct forensic examinations
  • resolve software vulnerabilities

  • InfoSec reports
  • InfoSec job postings

  • It is an open-source Linux security distribution and contains over 300 tools.

  • Update devices with security fixes and patches.
  • Test inbound and outbound traffic.
  • Disable ping, probing, and port scanning.

  • data loss
  • unauthorized access

  • Disable CD and USB access.
  • Provide security awareness training.
  • Use content filtering.

  • confidential business information
  • national security and foreign policy information
  • law enforcement records that implicate one of a set of enumerated concerns

  • Establish policies and procedures for guests visiting the building.
  • Conduct security awareness training regularly.

  • They are part of a protest group behind a political cause.

  • stored data
  • data in-process
  • data in-transit

  • confidentiality, integrity, and availability

  • Update the operating system and other application software.
  • Install and update antivirus software.

  • An attacker builds a botnet comprised of zombies.

  • Look for unauthorized accounts.

  • a set of attributes that describes user access rights

  • Keyspace increases exponentially

  • when the organization needs to look for prohibited activity

  • The hash function is a one-way mathematical function.

  • detection and analysis.
  • containment and recovery

  • the New York Stock Exchange

  • Local Security Policy tool

  • rate of false negatives and rate of false positives

  • The National Vulnerability Database website

Subscribe our YOUTUBE CHANNEL and LIKE our FACEBOOK PAGE to get UPDATE for COURSES

YOUTUBE  FACEBOOK TELEGRAM

THANK YOU!
ABCS PREPARATION SITE

ELEMENTS OF AI COURSE ANSWERS In this blog, I am going to share the answers to the Elements of AI course. Exercise 1: Is this AI or not? Which of the following are AI and which are not? Choose yes, no, or “kind of” was kind of means that it both can be or can't be, depending on the viewpoint. Spreadsheet that calculates sums and other pre-defined functions on given data Ans: No Predicting the stock market by fitting a curve to past data about stock prices Ans: Yes, No, Kind of A GPS navigation system for finding the fastest route Ans: Yes, No, Kind of A music recommendation system such as Spotify that suggests music based on the users' listening behavior Ans: Yes Big data storage solutions that can store huge amounts of data (such as images or video) and stream them to many users at the same time Ans: No Photo editing features such as brightness and contrast in applications such as Photoshop Ans: No, Kind of Style transfer filte

BUILDING AI COURSE ANSWERS CHAPTERWISE Exercise 1: Listing pineapple routes Exercise 2: Pineapple route emissions Exercise 3: Reach the highest summit Exercise 4: Probabilities Exercise 5: Warm-up Temperature Exercise 6: Simulated Annealing Exercise 7: Flip the coin Exercise 8: Fishing in the Nordics Exercise 9: Block or not Exercise 10: Naive Bayes classifier Exercise 11: Real estate price predictions Exercise 12: Least squares Exercise 13: Predictions with more data Exercise 14: Training data vs test data Exercise 15: Vector distances Exercise 16: Nearest neighbor Exercise 17: Bag of words Exercise 18: TF-IDF Exercise 19: Looking out for overfitting Exercise 20: Logistic regression JOIN US IN TELEGRAM CHANNEL https://t.me/abcschannel THANK YOU FOR YOUR SUPPORT!!