Mini Flashcards

1
Q

What do web browsers check when verifying the validity of an X.509 certificate?

A

Expiration date and issuer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an example of an Internet Service Provider (ISP)?

A

Comcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary goal of IT security?

A

Ensuring confidentiality, integrity, and availability of data and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the term used to describe the unique identifier assigned to a user’s web browser?

A

Browser fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which encryption tool can be used to encrypt an entire storage device on Windows?

A

Bitlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of the The Onion Router (TOR) network?

A

Anonymity and Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can users ensure the security of their mobile applications?

A

By downloading applications from the official app store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You suspect that someone has gained unauthorized remote access to your computer. Which of the following should you do first?

A

Disconnect your computer from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an example of a wireless network technology commonly used for short-range communication between devices?

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You suspect that your computer has been infected with a keylogger. What can you do to protect your sensitive information?

A

Type your sensitive information using an on-screen keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most effective type of phishing for targeting key executives within an organization?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Julia wants to create a strong password for her online banking account. Which of the following passwords is the most secure?

A

$tr0ngP@ssw0rd!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following devices is used to connect different networks together?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which encryption tool is used to encrypt files stored in file storage cloud services?

A

Cryptomator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which protocol provides secure communication over the Internet by encrypting data in transit?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a type of attack that takes advantage of software vulnerabilities to obtain unauthorized access to a system?

A

Exploit

17
Q

What is the primary function of an endpoint firewall?

A

To protect a single device from unauthorized access or attacks

18
Q

Mark is concerned about the security of his online accounts and wants to use two-factor authentication (2FA) to enhance their protection. Which of the following methods of 2FA is the most secure?

A

Using an authenticator application

19
Q

Which of the following is a type of security vulnerability that is not yet known to the software vendor or cybersecurity community?

A

Zero-day vulnerability

20
Q

What is a prevalent principle in copyright law that allows limited use of copyrighted material without requiring permission from the rights holder?

A

Fair use