Beeg Flashcards

(40 cards)

1
Q

Which of the following backup types is best suited for daily use?

A

Incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the most effective type of phishing for targeting key executives within an organization?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between an active and a passive RFID device?

A

The power source of the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an example of confidential information?

A

Personal identification numbers (PINs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do web browsers check when verifying the validity of an X.509 certificate?

A

Expiration date and issuer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the potential risk of publishing personal information online?

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your computer has become infected with a program that is causing it to perform slowly and display unwanted advertisements. What type of attack is this?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can users ensure the security of their mobile applications?

A

By downloading applications from the official app store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is single sign-on (SSO)?

A

A tool that allows users to log in to multiple systems with a single set of credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a nonprofit organization that provides free digital certificates?

A

Let’s Encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You want to access a website that is blocked in your country. Which of the following solutions would be the most appropriate for accessing the website?

A

A public VPN provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a type of security assessment that simulates an attack on a system to evaluate its security posture?

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following encryption methods is an example of symmetric encryption?

A

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary purpose of digital identities?

A

To verify the identity of individuals online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a key feature of BitLocker?

A

Integrated with Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an example of multi-factor authentication (MFA)?

A

Using a password and a fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the darknet?

A

A type of network that is only accessible through TOR

18
Q

What is information classification?

A

The process of categorizing information based on its sensitivity

19
Q

Which of the following is a network of compromised devices used to perform malicious activities?

20
Q

What is a hidden service?

A

A service that is not accessible through the regular internet

21
Q

What is the purpose of the validity checks performed by web browsers on X.509 certificates?

A

To verify that the certificate is associated with the correct website

To ensure that the certificate has not expired or been revoked

22
Q

What is a common consequence of ransomware?

A

Loss of sensitive information

23
Q

What is a common function of adware?

A

Displaying unwanted advertisements

24
Q

What is end-to-end encryption?

A

A type of encryption that protects data as it travels between two endpoints

25
Which of the following is a wired network connection commonly used for local area networks?
Twisted pair
26
What is the purpose of an RFID tag?
To store and transfer data wirelessly
27
What type of threat actor is an individual or group who use hacking as a form of activism to promote a particular social or political cause?
Hacktivist
28
Which of the following is a technology used for sending and receiving encrypted emails in Mozilla Thunderbird?
OpenPGP and S/MIME
29
Which protocol is used to translate domain names into IP addresses?
DNS
30
Which of the following is a router that is used as a gateway to forward traffic from a device to other networks?
Default Gateway
31
You work for a large company that has employees who need to access the company network from remote locations. Which of the following solutions would be the most appropriate for providing secure remote access?
An organization-specific VPN
32
Which of the following terms describes a security flaw that is unknown to the manufacturer, and for which no patch or solution is currently available?
Zero-day vulnerability
33
Which of the following is true about S/MIME?
S/MIME provides end-to-end encryption and digital signatures for email communications.
34
What is Trusted Computing?
A set of hardware and software technologies to enhance security
35
Which of the following is a free and open-source implementation of the OpenPGP encryption standard?
GnuPGP
36
Which of the following encryption methods is used for email encryption and requires the use of a public key and a private key pair?
OpenPGP
37
Which factor of authentication is commonly achieved by using token devices like key fobs or smart cards?
Ownership factor
38
Which of the following utilities can be used to encrypt files stored in file storage cloud services?
Cryptomator
39
Which of the following is a type of software that is embedded in hardware devices and provides instructions to the hardware to perform specific tasks?
Firmware
40
How many questions are there on the LPI Security Essentials exam?
40