? From Slides Flashcards

1
Q

What are we protecting in cybersecurity?

A

Data, systems, networks, intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who are we protecting assets from?

A

Hackers, insiders, malware, nation-states.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do we need to protect systems and data?

A

To ensure confidentiality, integrity, and availability (CIA Triad).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Does more complexity mean less security?

A

No, unnecessary complexity increases errors and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is goodwill a problem in security?

A

Yes, attackers can exploit trust through social engineering or insider threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What assets do we need to protect?

A

Data, software, hardware, networks, personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are assets threatened?

A

Malware, phishing, DoS, man-in-the-middle, insiders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can we counter threats to assets?

A

Firewalls, encryption, MFA, IDS, and user training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Are all attacks intelligent?

A

No, some like DoS are simple but effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is prevention always possible?

A

No, detection and recovery are crucial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are four types of active attacks?

A

Masquerade, Replay, Modification, DoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are passive attacks?

A

Eavesdropping, traffic analysis; hard to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is DES limited to 56-bit keys?

A

NSA and IBM compromised to balance security and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are ECB mode’s advantages and disadvantages?

A

Fast but vulnerable to replay and pattern attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to deal with non-block data in encryption?

A

Use stream ciphers or padding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is padding in encryption?

A

Extra data to align plaintext to block size.

17
Q

What is the risk of an unsigned public key certificate?

A

It can be forged, leading to MITM attacks.

18
Q

How will quantum computing affect encryption?

A

Longer keys for symmetric, new algorithms for public-key.

19
Q

Why can’t we trust CPU random number generators?

A

Potential backdoors and lack of transparency.

20
Q

Is your face an identifier or password?

A

Identifier, passwords require secrecy.

21
Q

Why are cleartext passwords or email storage bad?

A

Intercepted credentials expose systems.

22
Q

Why do we need salt values?

A

To prevent hash collisions and defeat rainbow tables.

23
Q

Why are slow hash functions important?

A

They slow down brute-force attacks.

24
Q

How does salting prevent dictionary attacks?

A

Forces unique hashing for each password.

25
Is bcrypt the most secure Unix hash?
Yes, due to salting and iterative rounds.
26
Why are rainbow tables effective?
They pre-compute hashes to speed up attacks.
27
How does John the Ripper work?
Uses dictionary, brute-force, and hybrid attacks.
28
Are hotel key cards reprogrammed at each room change?
Yes, for security.
29
Is MFA step 2 verification in-band or out-of-band?
Out-of-band preferred; in-band is riskier.
30
What happens if in-band MFA is compromised?
Attacker gains access to both factors.
31
What is the threat model for passkeys?
Device security and backup protection.
32
ACLs vs. Capability Lists – which is better?
ACLs are easier to manage and scale.
33
What are the missing 3 bits in 12-bit systems?
SUID, SGID, sticky bits.
34
Why is SUID/SGID dangerous?
It allows privilege escalation.
35
How can SUID binaries be hidden?
Obfuscation or moving to hidden directories.
36
How do capabilities control binaries?
Grant limited root privileges, unlike SUID.
37
Advantages of capabilities over SUID?
More secure, limits privileges to necessary functions.
38
Disadvantages of capabilities?
Complex to configure and manage.