? From Slides Flashcards

1
Q

What are we protecting in cybersecurity?

A

Data, systems, networks, intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who are we protecting assets from?

A

Hackers, insiders, malware, nation-states.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do we need to protect systems and data?

A

To ensure confidentiality, integrity, and availability (CIA Triad).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Does more complexity mean less security?

A

No, unnecessary complexity increases errors and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is goodwill a problem in security?

A

Yes, attackers can exploit trust through social engineering or insider threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What assets do we need to protect?

A

Data, software, hardware, networks, personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are assets threatened?

A

Malware, phishing, DoS, man-in-the-middle, insiders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can we counter threats to assets?

A

Firewalls, encryption, MFA, IDS, and user training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Are all attacks intelligent?

A

No, some like DoS are simple but effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is prevention always possible?

A

No, detection and recovery are crucial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are four types of active attacks?

A

Masquerade, Replay, Modification, DoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are passive attacks?

A

Eavesdropping, traffic analysis; hard to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is DES limited to 56-bit keys?

A

NSA and IBM compromised to balance security and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are ECB mode’s advantages and disadvantages?

A

Fast but vulnerable to replay and pattern attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to deal with non-block data in encryption?

A

Use stream ciphers or padding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is padding in encryption?

A

Extra data to align plaintext to block size.

17
Q

What is the risk of an unsigned public key certificate?

A

It can be forged, leading to MITM attacks.

18
Q

How will quantum computing affect encryption?

A

Longer keys for symmetric, new algorithms for public-key.

19
Q

Why can’t we trust CPU random number generators?

A

Potential backdoors and lack of transparency.

20
Q

Is your face an identifier or password?

A

Identifier, passwords require secrecy.

21
Q

Why are cleartext passwords or email storage bad?

A

Intercepted credentials expose systems.

22
Q

Why do we need salt values?

A

To prevent hash collisions and defeat rainbow tables.

23
Q

Why are slow hash functions important?

A

They slow down brute-force attacks.

24
Q

How does salting prevent dictionary attacks?

A

Forces unique hashing for each password.

25
Q

Is bcrypt the most secure Unix hash?

A

Yes, due to salting and iterative rounds.

26
Q

Why are rainbow tables effective?

A

They pre-compute hashes to speed up attacks.

27
Q

How does John the Ripper work?

A

Uses dictionary, brute-force, and hybrid attacks.

28
Q

Are hotel key cards reprogrammed at each room change?

A

Yes, for security.

29
Q

Is MFA step 2 verification in-band or out-of-band?

A

Out-of-band preferred; in-band is riskier.

30
Q

What happens if in-band MFA is compromised?

A

Attacker gains access to both factors.

31
Q

What is the threat model for passkeys?

A

Device security and backup protection.

32
Q

ACLs vs. Capability Lists – which is better?

A

ACLs are easier to manage and scale.

33
Q

What are the missing 3 bits in 12-bit systems?

A

SUID, SGID, sticky bits.

34
Q

Why is SUID/SGID dangerous?

A

It allows privilege escalation.

35
Q

How can SUID binaries be hidden?

A

Obfuscation or moving to hidden directories.

36
Q

How do capabilities control binaries?

A

Grant limited root privileges, unlike SUID.

37
Q

Advantages of capabilities over SUID?

A

More secure, limits privileges to necessary functions.

38
Q

Disadvantages of capabilities?

A

Complex to configure and manage.