Security + Flashcards

(75 cards)

1
Q

Which type of attack involves intercepting and modifying communications between two parties without their knowledge?

A

Man-in-the-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a zero-day exploit?

A

An exploit used before a vulnerability is publicly known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of malware encrypts a victim’s files and demands payment for decryption?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary purpose of a SIEM solution?

A

To aggregate and analyze log data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following tools can be used to scan a network for open ports and vulnerabilities?

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of device acts as a buffer to prevent unauthorized traffic from reaching the internal network?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the principle of ‘least privilege’?

A

Users should only have the minimum access necessary to perform their duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a best practice for securing cloud environments?

A

Encrypting sensitive data in transit and at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which protocol is commonly used to secure communication between a web server and a client?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between authentication and authorization?

A

Authentication verifies identity; authorization determines access levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an example of multifactor authentication?

A

Smart card and PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a role-based access control (RBAC) system?

A

Users are assigned permissions based on their roles within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the first step in the risk management process?

A

Risk identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an example of a compensating control?

A

Requiring a secondary approval process for transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between a quantitative and qualitative risk assessment?

A

Quantitative measures impact in numerical terms; qualitative uses subjective ratings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is phishing?

A

A social engineering attack to trick users into revealing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the primary purpose of a denial-of-service (DoS) attack?

A

To disrupt the availability of a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does an SQL injection attack exploit?

A

A vulnerability in database queries to execute malicious SQL statements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a botnet?

A

A network of compromised devices controlled by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is tailgating?

A

An attacker following an authorized person into a secured area without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the primary function of a VPN?

A

To create a secure, encrypted connection over an untrusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which protocol does SSH replace for secure remote access?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does a honeypot do?

A

Attracts attackers to monitor their behavior and gather intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of a vulnerability scanner?

A

To identify and report security vulnerabilities in systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the difference between a black-box and white-box penetration test?
Black-box tests have no prior knowledge of the system; white-box tests have full knowledge.
26
What is the purpose of network segmentation?
To limit access and reduce the potential spread of attacks.
27
What is a DMZ in network security?
A demilitarized zone that separates internal networks from external networks.
28
What is the function of load balancers in a network?
To distribute traffic evenly across multiple servers.
29
What is the main advantage of using Infrastructure as Code (IaC)?
Automated, consistent configuration management of systems.
30
What is the difference between symmetric and asymmetric encryption?
Symmetric uses one key for encryption and decryption; asymmetric uses a key pair.
31
What is single sign-on (SSO)?
A system that allows users to log in once and access multiple applications.
32
What is the purpose of a password policy?
To enforce secure and consistent password management practices.
33
What is two-factor authentication (2FA)?
An authentication process requiring two forms of verification.
34
What is privilege escalation?
Gaining unauthorized access to higher-level privileges within a system.
35
What is the purpose of a federated identity system?
To enable a single identity across multiple organizations or systems.
36
What is risk mitigation?
The process of reducing the impact or likelihood of a risk.
37
What is the purpose of an incident response plan?
To provide a structured approach to handling security incidents.
38
What is the primary goal of business continuity planning?
To ensure critical operations continue during a disruption.
39
What is an acceptable use policy (AUP)?
A document outlining the rules for using an organization's resources.
40
What is the difference between residual and inherent risk?
Residual is the remaining risk after controls; inherent is the risk before controls.
41
What is the purpose of a digital signature?
To provide integrity, authentication, and non-repudiation for digital messages.
42
What is the function of a certificate authority (CA)?
To issue and manage digital certificates.
43
What is hashing?
A one-way function that generates a fixed-size output from input data.
44
What is Perfect Forward Secrecy (PFS)?
A feature that ensures session keys are not compromised even if the private key is.
45
What does a public key infrastructure (PKI) enable?
Secure communication using certificates and encryption.
46
What is a rootkit?
Malware that hides its presence to maintain privileged access to a system.
47
What is spear phishing?
A targeted phishing attack aimed at a specific individual or organization.
48
What does a logic bomb do?
Triggers a malicious action when specific conditions are met.
49
What is cross-site scripting (XSS)?
An attack that injects malicious scripts into trusted websites.
50
What is the primary goal of social engineering attacks?
To manipulate individuals into divulging confidential information.
51
What does IDS stand for?
Intrusion Detection System.
52
What is the primary purpose of a proxy server?
To act as an intermediary between users and the internet.
53
What is Wireshark primarily used for?
Capturing and analyzing network traffic.
54
What is the purpose of patch management?
To update systems and fix security vulnerabilities.
55
What is the function of a sandbox in cybersecurity?
To isolate and analyze potentially malicious files or software.
56
What is the purpose of endpoint detection and response (EDR) solutions?
To monitor and respond to threats on endpoint devices.
57
What is geofencing?
Restricting access based on geographic location.
58
What is the purpose of a security baseline?
To establish a minimum standard for system security.
59
What is micro-segmentation?
Dividing a network into smaller, secure segments.
60
What is the main benefit of using virtualization?
Efficient use of resources and isolation of environments.
61
What is Kerberos used for?
A protocol for secure authentication in a network.
62
What is a biometric factor in authentication?
A physical characteristic, such as a fingerprint or retinal scan.
63
What is an access control list (ACL)?
A list of permissions defining access to resources.
64
What is a token in IAM?
A physical or digital object used to prove identity or access rights.
65
What is the primary function of LDAP?
To manage and access directory information services.
66
What is the purpose of a risk register?
To document and track identified risks and their management.
67
What is the difference between qualitative and quantitative risk analysis?
Qualitative is subjective; quantitative uses numerical data.
68
What is a disaster recovery plan (DRP)?
A plan to restore systems and data after a major disruption.
69
What is residual risk?
The risk remaining after controls have been applied.
70
What is the purpose of a tabletop exercise?
To simulate a security incident for training purposes.
71
What is the Advanced Encryption Standard (AES)?
A widely used symmetric encryption algorithm.
72
What is a cryptographic key?
A value used to encrypt and decrypt data.
73
What is a nonce?
A random or unique value used in cryptographic operations to prevent replay attacks.
74
What is steganography?
Hiding information within other non-secret data, like images or audio files.
75
What is the purpose of Transport Layer Security (TLS)?
To encrypt communication between a client and server.