Week 1 Flashcards

(15 cards)

1
Q

Which type of authentication verifies users using something they know, something they have, and something they are?
A. Single Sign-On (SSO), B. Federation, C. Multifactor Authentication (MFA), D. Role-Based Authentication

A

C. Multifactor Authentication (MFA)

MFA enhances security by requiring multiple verification methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should a company implement to encrypt all emails sent outside the organization?
A. SPF, B. DKIM, C. S/MIME, D. SIEM

A

C. S/MIME

S/MIME provides a standard for public key encryption and signing of MIME data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which security model assumes that every request must be verified and no implicit trust exists?
A. Zero Trust, B. Discretionary Access Control, C. Federated Access, D. Least Privilege

A

A. Zero Trust

Zero Trust requires strict verification for all users, both inside and outside the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What security control uses a cryptographic key stored in a hardware device to enhance security?
A. TPM, B. HSM, C. MFA, D. AES

A

B. HSM

HSM stands for Hardware Security Module, which securely manages digital keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which technique involves a hacker intercepting and altering communication between two parties without their knowledge?
A. On-Path Attack, B. Brute Force, C. DDoS, D. SQL Injection

A

A. On-Path Attack

This type of attack is also known as a man-in-the-middle attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What encryption strategy is used when a company encrypts database records for employee salaries but leaves job titles in plaintext?
A. Full-disk Encryption, B. Record-Level Encryption, C. Symmetric Encryption, D. Key Escrow

A

B. Record-Level Encryption

Record-Level Encryption protects specific data records while leaving others unencrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attack involves an attacker sending massive amounts of malformed packets to crash a target server?
A. Privilege Escalation, B. SQL Injection, C. DDoS, D. Directory Traversal

A

C. DDoS

DDoS stands for Distributed Denial of Service, aimed at overwhelming a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which access control method assigns clearance levels to files and users?
A. Mandatory, B. Discretionary, C. Role-based, D. Rule-based

A

A. Mandatory

Mandatory access control (MAC) restricts access based on predefined policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which protocol is used for encrypted remote access to network devices?
A. FTP, B. SSH, C. Telnet, D. SNMP

A

B. SSH

SSH stands for Secure Shell, providing a secure channel over an unsecured network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What principle is violated when an employee modifies a database record without proper authorization?
A. Confidentiality, B. Availability, C. Integrity, D. Authentication

A

C. Integrity

Integrity ensures that data is accurate and trustworthy, requiring proper authorization for changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What authentication method allows users to authenticate with a single set of credentials for multiple applications?
A. SSO, B. MFA, C. Federation, D. Kerberos

A

A. SSO

SSO stands for Single Sign-On, simplifying user authentication across multiple services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What method is used to embed malicious code into a website by manipulating input fields?
A. SQL Injection, B. Cross-Site Scripting (XSS), C. Brute Force, D. Man-in-the-Middle

A

B. Cross-Site Scripting (XSS)

XSS attacks allow attackers to inject scripts into webpages viewed by other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which document defines the terms for an agreement between two organizations to share information securely?
A. SLA, B. MOA, C. NDA, D. RPO

A

B. MOA

MOA stands for Memorandum of Agreement, outlining responsibilities and terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is it called when an attacker creates a fake website that mimics a real one to steal login credentials?
A. Phishing, B. Spoofing, C. On-Path Attack, D. Data Masking

A

A. Phishing

Phishing is a social engineering attack that typically involves deceptive emails or websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the BEST way to protect credit card data during real-time transactions?
A. Masking, B. Tokenization, C. Encryption, D. Firewall

A

B. Tokenization

Tokenization replaces sensitive information with non-sensitive equivalents, reducing risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly