More Exam questions Flashcards
(55 cards)
The CIA Triad is considered to be one of the core principles of information security; what does “A” stand for in this acronym? (Select 1 correct answer)
A. Authorization
B. Automation
C. Availability
D. Authentication
C
What is the name of an extremely large table of hash values generated by an attacker to crack system passwords? (Select 1 correct answer)
A. Dictionary table
B. Rainbow table
C. Privilege elevation table
D. None of the above
B
Which of the following properties does SSL/TLS protect? (Select 1 correct answer)
A. Privacy
B. Availability
C. Confidentiality, integrity, and authentication
D. Auditing
C
What is a shoulder surfing attack? (Select 1 correct answer)
A. Replay attack
B. Eavesdropping attack
C. Trojan horse attack
D. Denial of service attack
B
Password files can be protected by what means? (Select 2 correct answers)
A. Honeypots
B. Cryptographic protection
C. Virus scanners
D. Access control
B, D
In access control, what is responsible for regulating the access of subjects to objects on the basis of security parameters? (Select 1 correct answer)
A. Availability checker
B. Reference monitor
C. Logic bomb
D. Virus analyzer
B
Which of the following can be considered to be an elevation of privilege? (Select 1 correct answer)
A. Someone extracts secrets from error messages
B. Someone floods the network with requests
C. Someone modifies data to do things other than what is permitted for that user
D. Someone ignores the security policy
C
Which of the following are examples of symmetric encryption algorithms? (Select 2)
A. 3DES
B. MD5 hash
C. RSA
D. AES
A, D
Access control can support which of the following security goals? (Select 2 correct answers)
A. Availability
B. Integrity
C. Confidentiality
D. None of the above
B, C
How many keys does an asymmetric cipher rely on for secure communication? (Select 1 correct answer)
A. 3
B. 2
C. 1
D. No key is required
B
What is the process of granting a privilege or permission to a system entity to access a system resource called? (Select 1 correct answer)
A. Authentication
B. Monitoring
C. Authorization
D. Control
C
Enforcing a system-generated password on a user can be considered as an example of what? (Select 1 correct answer)
A. Reactive password checking
B. Idle password checking
C. Proactive password checking
D. All of the above
C
What is a web security attack that allows an attacker to interfere with transaction queries to a database? (Select 1 correct answer)
A. Social engineering attack
B. SQL injection attack
C. Brute-force attack
D. Database dictionary attack
B
Hacking a system by exploiting the people that use it is referred to as what? (Select 1 correct answer)
A. Command injection attack
B. SQL injection attack
C. Social engineering attack
D. Brute-force attack
C
One of the criteria that a one-way function should satisfy is what? (Select 1 correct answer)
A. Easy to reverse
B. Hard to reverse
C. Helps prevent virus
D. Easy to decode
B
What is identification?
Identification is the process of claiming an identity. It’s the step where a user presents their identity, typically through a unique identifier.
What is authentication?
Authentication is the process of verifying the identity presented during the identification step. It’s how the system checks whether the user is indeed who they claim to be.
What is Kerberos?
Kerberos is a network authentication protocol that uses tickets to allow nodes to communicate over a non-secure network.
What is OAuth?
OAuth is a protocol that allows third-party applications to access user data without exposing their credentials.
What is SAML (Security Assertion Markup Language)?
It is a protocol that exchanges authentication and authorization data between an identity provider and a service provider.
What is an offline dictionary attack?
Attackers obtain hashed passwords and use a precomputed dictionary of hash values to crack them offline.
What is a hash function?
A hash function is a mathematical function that transforms input (like your
password) into a fixed-length string of characters, called a hash.
What is a trusted path mechanism?
Trusted path is a mechanism that guarantees that the user communicates with the operating system and not with a spoofing program.
What is EEPROM (Electrically Erasable Programmable ROM)?
EEPROM is a type of memory that can be written to and erased using electrical signals. Unlike regular ROM, which is permanent, EEPROM allows data to be changed or updated. EEPROM is slower than regular RAM but more flexible.