Security + CIAT QUESTIONS Flashcards

exam

1
Q

CAPTCHA

A

used to mitigate high volume of fraudulent login attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Implementing input validation techniques

A

used to ensure that its web application is secure from SQL injection attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virtual Private Network (VPN)

A

used to ensure the integrity of data transferred between its internal network and remote employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Loss Prevention (DLP) system

A

focuses on detecting and preventing the loss, leakage, or misuse of data through breaches, exfiltration transmissions, and unauthorized use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Enabling MAC address filtering

A

It adds an extra layer of security by limiting the number of devices that can connect to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

prepared statements in database queries

A

used to ensure that its web server is **secure **from SQL injection attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

email gateway with anti-phishing features

A

reduce the risk of email phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

malware infections from USB drives* prevention (company issue)*

A

Disable USB ports on all company computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

issues with BYOD

A

protection against data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port security

A

You can specify the maximum number of MAC addresses that can be learned on a port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DHCP snooping

A

occurs when an attacker attempts to respond to DHCP requests and trying to list themselves (spoofs) as the default gateway or DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSID broadcast disabling

A

Unable to see SSID wi-fi network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

website is frequently targeted by SQL injection attacks.

A

defense is to use parameterized queries in the website code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

mobile device management (MDM) solution

A

ensure that mobile devices are secure against data leakage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data encryption

A

ensure the confidentiality and integrity of customer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FIRST line of defense against malware

A

Antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

unpatched vulnerability in a critical application.

A

Apply a temporary workaround

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Firewall rules

A

determine which types of traffic your firewall accepts and which are denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

File integrity monitoring

A

examines the integrity of sensitive files, registry keys, and folders within the host operating system and checks whether files have been altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

something they have and something they know.

A

Multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Implementing a CDN (Content Delivery Network)

A

ensures that no single server bears the brunt of an attack, reducing the likelihood of a successful DDoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

improve its email security

A

email encryption

23
Q

Spam filters

A

designed to identify emails that attackers or marketers use to send unwanted or dangerous content

24
Q

minimize security vulnerabilities of new software App

A

Conducting a code review

25
A DNS filtering service
the process of using the Domain Name System to block malicious websites and filter out harmful or inappropriate content.
26
HTTPS
is the secure version of HTTP,primary protocol used to send data between a web browser and a website. HTTPS is encrypted in order to increase security of data transfer.
27
Role-based access control (RBAC)
the idea of assigning permissions to users based on their role within an organization
28
Audit logging
the process of documenting activity within the software systems used across your organization
29
User access controls
identifying a user based on their credentials and then authorizing the appropriate level of access once they are authenticated
30
WPA2
secure its Wi-Fi network
31
TKIP
a security protocol used in the IEEE 802.11 wireless networking standard
32
WEP
was the first attempt at wireless protection. The aim was to add security to wireless networks by encrypting data.
33
WPA
is a security standard for computing devices with wireless internet connections.
34
Isolate the infected systems
several workstations on the network have been infected with malware.
35
network perimeter _protect against external threats and attacks
A network-based firewall
36
A host-based firewall
installed directly on individual networked devices to filter network traffic on a single device by inspecting both incoming and outgoing data.
37
NIDS (Network Intrusion Detection System)
provide continuous network monitoring across on-premise and cloud infrastructure to detect malicious activity like policy violations, lateral movement or data exfiltration.
38
39
web content filtering solution
a technicque that blocks and screens access to inappropriate or unsafe web content.
40
Degaussing
will not work on SSD only HDD
40
41
securely erase data from SSDs before disposal
Physical destruction
42
Overwriting
cannot be used on a SSD
43
WPA2-PSK encryption
uses a stronger encryption key and has built-in security features to prevent attacks like brute-force and dictionary attacks -prevent unauthorized access-
44
leaking confidential information being leaked
Review access logs for unusual activity
45
investigating a potential data breach.
Identification is the first step that needs to be taken
46
Eradication
to get rid of something completely
47
Data sovereignty
PRIMARY security concern, when transferring data
48
FTP
standard communication protocol used for the transfer of computer files from a server to a client on a computer network
49
SSL/TLS encryption
protocol or communication rule that allows computer systems to talk to each other on the internet safely.
50
Data classification policy
identifies and helps protect sensitive/confidential data with a framework of rules, processes, and procedures for each class
51
Protocol analyzer
is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel.
52
network scanner
a software tool used for diagnostic and investigative purposes to find and categorize what devices are running on a network.