問題一覧
1
originates from a single source and aims to overwhelm a network or server.
DoS attack
2
means that the client is unable to process the request
408 request timeout
3
Ensuring that information security practices align with relevant laws, regulations, and industry standards.
compliance
4
Ensuring that information is available and accessible to authorized users when need
availability
5
Types of Cyber Attacks to Know
1. DoS and DDoS 2. Social Engineering Attacks 3. DNS Spoofing 4. Man in the Middle Attack 5. Password Cracking 6. SQL Injection 7. Insider Threats 8. IoT Based Attacks 9. Malware
6
This refers to a general server-side error.
500 Internal Server Error
7
type of cyber attack exploits mobile devices
smishing
8
2 principles that governs information security programs
non-repudiation authenticity
9
tells us that the server is currently offline
503 service unavailable
10
means maintaining accuracy and completeness of data. This means data cannot be edited in an unauthorized way
integrity
11
This error means that there’s something wrong with the server connection
502 bad gateway
12
Planning and implementing strategies to maintain critical business functions during and after disruptions.
business continuity
13
targets are conned into rerouting the destination
diversion theft
14
means verifying that users are who they say they are and that each input arriving at the destination is from a trusted source
authenticity
15
pose as someone’s friends or colleagues t
spear phishing
16
Developing and implementing procedures to respond to and recover from security incidents.
incident response
17
is a more intricate form of a DoS attack.
DDoS attack
18
refers to servers side error
504 gateway timeout
19
key aspects of it information assurance
security management risk management business continuity compliance incident response
20
is a broader concept that encompasses not only the security aspects
information assurance
21
involves luring potential targets
baiting
22
also know as voice phishing
vishing
23
means one party cannot deny receiving a message
non-repudiation
24
means information is not disclosed to unauthorized individuals, entities, and processes.
confidentiality
25
groups of computers all acting together
botnets
26
Identifying, assessing, and managing risks to ensure the continuity and reliability of information.
risk management
27
social engineering examples
baiting diversion theft honeytrap phishing pretexting AI and deepfakes
28
attackers seduce their targets
honeytrap
29
essentially an online deception
social engineering attacks
30
referred to as cybersecurity, is the practice of protecting information from unauthorized access, disclosure, disruption, modification, or destruction.
information security
31
information security are built 3 objectives
confidentiality integrity availability
32
typically the sending of fraudulent
phishing
33
, persuasion and observation to deceive and manipulate people so they reveal personal information about themselves, which can be used for fraudulent purposes.
engineering attacks
34
The planning, implementation, and monitoring of security measures to protect information assets.
security management