Beeg Flashcards

1
Q

Which of the following backup types is best suited for daily use?

A

Incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the most effective type of phishing for targeting key executives within an organization?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between an active and a passive RFID device?

A

The power source of the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an example of confidential information?

A

Personal identification numbers (PINs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do web browsers check when verifying the validity of an X.509 certificate?

A

Expiration date and issuer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the potential risk of publishing personal information online?

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your computer has become infected with a program that is causing it to perform slowly and display unwanted advertisements. What type of attack is this?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can users ensure the security of their mobile applications?

A

By downloading applications from the official app store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is single sign-on (SSO)?

A

A tool that allows users to log in to multiple systems with a single set of credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a nonprofit organization that provides free digital certificates?

A

Let’s Encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You want to access a website that is blocked in your country. Which of the following solutions would be the most appropriate for accessing the website?

A

A public VPN provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a type of security assessment that simulates an attack on a system to evaluate its security posture?

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following encryption methods is an example of symmetric encryption?

A

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary purpose of digital identities?

A

To verify the identity of individuals online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a key feature of BitLocker?

A

Integrated with Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an example of multi-factor authentication (MFA)?

A

Using a password and a fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the darknet?

A

A type of network that is only accessible through TOR

18
Q

What is information classification?

A

The process of categorizing information based on its sensitivity

19
Q

Which of the following is a network of compromised devices used to perform malicious activities?

A

Botnet

20
Q

What is a hidden service?

A

A service that is not accessible through the regular internet

21
Q

What is the purpose of the validity checks performed by web browsers on X.509 certificates?

A

To verify that the certificate is associated with the correct website

To ensure that the certificate has not expired or been revoked

22
Q

What is a common consequence of ransomware?

A

Loss of sensitive information

23
Q

What is a common function of adware?

A

Displaying unwanted advertisements

24
Q

What is end-to-end encryption?

A

A type of encryption that protects data as it travels between two endpoints

25
Q

Which of the following is a wired network connection commonly used for local area networks?

A

Twisted pair

26
Q

What is the purpose of an RFID tag?

A

To store and transfer data wirelessly

27
Q

What type of threat actor is an individual or group who use hacking as a form of activism to promote a particular social or political cause?

A

Hacktivist

28
Q

Which of the following is a technology used for sending and receiving encrypted emails in Mozilla Thunderbird?

A

OpenPGP and S/MIME

29
Q

Which protocol is used to translate domain names into IP addresses?

A

DNS

30
Q

Which of the following is a router that is used as a gateway to forward traffic from a device to other networks?

A

Default Gateway

31
Q

You work for a large company that has employees who need to access the company network from remote locations. Which of the following solutions would be the most appropriate for providing secure remote access?

A

An organization-specific VPN

32
Q

Which of the following terms describes a security flaw that is unknown to the manufacturer, and for which no patch or solution is currently available?

A

Zero-day vulnerability

33
Q

Which of the following is true about S/MIME?

A

S/MIME provides end-to-end encryption and digital signatures for email communications.

34
Q

What is Trusted Computing?

A

A set of hardware and software technologies to enhance security

35
Q

Which of the following is a free and open-source implementation of the OpenPGP encryption standard?

A

GnuPGP

36
Q

Which of the following encryption methods is used for email encryption and requires the use of a public key and a private key pair?

A

OpenPGP

37
Q

Which factor of authentication is commonly achieved by using token devices like key fobs or smart cards?

A

Ownership factor

38
Q

Which of the following utilities can be used to encrypt files stored in file storage cloud services?

A

Cryptomator

39
Q

Which of the following is a type of software that is embedded in hardware devices and provides instructions to the hardware to perform specific tasks?

A

Firmware

40
Q

How many questions are there on the LPI Security Essentials exam?

A

40