Beeg Flashcards
(40 cards)
Which of the following backup types is best suited for daily use?
Incremental backup
What is the most effective type of phishing for targeting key executives within an organization?
Whaling
What is the difference between an active and a passive RFID device?
The power source of the device
Which of the following is an example of confidential information?
Personal identification numbers (PINs)
What do web browsers check when verifying the validity of an X.509 certificate?
Expiration date and issuer
What is the potential risk of publishing personal information online?
Identity theft
Your computer has become infected with a program that is causing it to perform slowly and display unwanted advertisements. What type of attack is this?
Malware
How can users ensure the security of their mobile applications?
By downloading applications from the official app store
What is single sign-on (SSO)?
A tool that allows users to log in to multiple systems with a single set of credentials
Which of the following is a nonprofit organization that provides free digital certificates?
Let’s Encrypt
You want to access a website that is blocked in your country. Which of the following solutions would be the most appropriate for accessing the website?
A public VPN provider
Which of the following is a type of security assessment that simulates an attack on a system to evaluate its security posture?
Penetration testing
Which of the following encryption methods is an example of symmetric encryption?
AES (Advanced Encryption Standard)
What is the primary purpose of digital identities?
To verify the identity of individuals online
Which of the following is a key feature of BitLocker?
Integrated with Windows
Which of the following is an example of multi-factor authentication (MFA)?
Using a password and a fingerprint
What is the darknet?
A type of network that is only accessible through TOR
What is information classification?
The process of categorizing information based on its sensitivity
Which of the following is a network of compromised devices used to perform malicious activities?
Botnet
What is a hidden service?
A service that is not accessible through the regular internet
What is the purpose of the validity checks performed by web browsers on X.509 certificates?
To verify that the certificate is associated with the correct website
To ensure that the certificate has not expired or been revoked
What is a common consequence of ransomware?
Loss of sensitive information
What is a common function of adware?
Displaying unwanted advertisements
What is end-to-end encryption?
A type of encryption that protects data as it travels between two endpoints