QUESTIONS ALL ANSWERED
CORRECT 2025-2026 UPDATED.
What types of security loss exist? - Answer unauthorized data disclosure, incorrect data
modification, faulty service, denial of service, loss of infrastructure
unauthorized data disclosure - Answer occurs when a threat obtains data that is supposed to
be protected
ex: pretexting, phishing, spoofing, sniffing, wardriving, hacking
Pretexting - Answer deceiving someone over the internet by pretending to be another
person or organization
Phishing - Answer technique for obtaining unauthorized data that uses pretexting via email.
Phisher - Answer Pretends to be a legitimate company and sends an email requesting
confidential data such as account numbers, social security numbers, account passwords and so
forth.
Spoofing - Answer When someone pretends to be someone else with the intent of obtaining
unauthorized data.
IP spoofing - Answer occurs when an intruder uses another site's IP address to masquerade
as that other site
email spoofing - Answer synonym for phishing
Sniffing - Answer technique for intercepting computer communications
Wardrivers - Answer take computers with wireless connections through an area and search
for unprotected wireless networks. Use packet sniffers.
, incorrect data modification - Answer can occur through human error when employees follow
procedures incorrectly or when procedures have been designed incorrectly
ex: system errors
faulty service - Answer includes problems that result because of incorrect system operation
ex: usurpation
usurpation - Answer Occurs when unauthorized programs invade a computer system and
replace legitimate programs.
Denial of Service - Answer Security problem in which users are not able to access an
information system; can be caused by human errors, natural disaster, or malicious activity.
Loss of Infrastructure - Answer Human accidents
Theft and terrorist events
Disgruntled or terminated employee
Natural disasters
ex: advances persistent threat
Advanced Persistent Threat (APT) - Answer a sophisticated, possibly long-running computer
hack that is perpetrated by large, well-funded organizations such as governments
the goal of information security is to - Answer find an appropriate trade-off between the risk
of loss and the cost of implementing safeguards
components of a cyber security model - Answer 1. Assets/Targets
2. Threats
3. Vulnerabilities
4. Safeguards/Controls
Assets/Targets - Answer resource or information that need to be protected