Week 1 Flashcards
(15 cards)
Which type of authentication verifies users using something they know, something they have, and something they are?
A. Single Sign-On (SSO), B. Federation, C. Multifactor Authentication (MFA), D. Role-Based Authentication
C. Multifactor Authentication (MFA)
MFA enhances security by requiring multiple verification methods.
What should a company implement to encrypt all emails sent outside the organization?
A. SPF, B. DKIM, C. S/MIME, D. SIEM
C. S/MIME
S/MIME provides a standard for public key encryption and signing of MIME data.
Which security model assumes that every request must be verified and no implicit trust exists?
A. Zero Trust, B. Discretionary Access Control, C. Federated Access, D. Least Privilege
A. Zero Trust
Zero Trust requires strict verification for all users, both inside and outside the network.
What security control uses a cryptographic key stored in a hardware device to enhance security?
A. TPM, B. HSM, C. MFA, D. AES
B. HSM
HSM stands for Hardware Security Module, which securely manages digital keys.
Which technique involves a hacker intercepting and altering communication between two parties without their knowledge?
A. On-Path Attack, B. Brute Force, C. DDoS, D. SQL Injection
A. On-Path Attack
This type of attack is also known as a man-in-the-middle attack.
What encryption strategy is used when a company encrypts database records for employee salaries but leaves job titles in plaintext?
A. Full-disk Encryption, B. Record-Level Encryption, C. Symmetric Encryption, D. Key Escrow
B. Record-Level Encryption
Record-Level Encryption protects specific data records while leaving others unencrypted.
What type of attack involves an attacker sending massive amounts of malformed packets to crash a target server?
A. Privilege Escalation, B. SQL Injection, C. DDoS, D. Directory Traversal
C. DDoS
DDoS stands for Distributed Denial of Service, aimed at overwhelming a system.
Which access control method assigns clearance levels to files and users?
A. Mandatory, B. Discretionary, C. Role-based, D. Rule-based
A. Mandatory
Mandatory access control (MAC) restricts access based on predefined policies.
Which protocol is used for encrypted remote access to network devices?
A. FTP, B. SSH, C. Telnet, D. SNMP
B. SSH
SSH stands for Secure Shell, providing a secure channel over an unsecured network.
What principle is violated when an employee modifies a database record without proper authorization?
A. Confidentiality, B. Availability, C. Integrity, D. Authentication
C. Integrity
Integrity ensures that data is accurate and trustworthy, requiring proper authorization for changes.
What authentication method allows users to authenticate with a single set of credentials for multiple applications?
A. SSO, B. MFA, C. Federation, D. Kerberos
A. SSO
SSO stands for Single Sign-On, simplifying user authentication across multiple services.
What method is used to embed malicious code into a website by manipulating input fields?
A. SQL Injection, B. Cross-Site Scripting (XSS), C. Brute Force, D. Man-in-the-Middle
B. Cross-Site Scripting (XSS)
XSS attacks allow attackers to inject scripts into webpages viewed by other users.
Which document defines the terms for an agreement between two organizations to share information securely?
A. SLA, B. MOA, C. NDA, D. RPO
B. MOA
MOA stands for Memorandum of Agreement, outlining responsibilities and terms.
What is it called when an attacker creates a fake website that mimics a real one to steal login credentials?
A. Phishing, B. Spoofing, C. On-Path Attack, D. Data Masking
A. Phishing
Phishing is a social engineering attack that typically involves deceptive emails or websites.
What is the BEST way to protect credit card data during real-time transactions?
A. Masking, B. Tokenization, C. Encryption, D. Firewall
B. Tokenization
Tokenization replaces sensitive information with non-sensitive equivalents, reducing risk.