Mini Flashcards
What do web browsers check when verifying the validity of an X.509 certificate?
Expiration date and issuer
Which of the following is an example of an Internet Service Provider (ISP)?
Comcast
What is the primary goal of IT security?
Ensuring confidentiality, integrity, and availability of data and systems
What is the term used to describe the unique identifier assigned to a user’s web browser?
Browser fingerprinting
Which encryption tool can be used to encrypt an entire storage device on Windows?
Bitlocker
What is the purpose of the The Onion Router (TOR) network?
Anonymity and Privacy
How can users ensure the security of their mobile applications?
By downloading applications from the official app store
You suspect that someone has gained unauthorized remote access to your computer. Which of the following should you do first?
Disconnect your computer from the internet
Which of the following is an example of a wireless network technology commonly used for short-range communication between devices?
Bluetooth
You suspect that your computer has been infected with a keylogger. What can you do to protect your sensitive information?
Type your sensitive information using an on-screen keyboard
What is the most effective type of phishing for targeting key executives within an organization?
Whaling
Julia wants to create a strong password for her online banking account. Which of the following passwords is the most secure?
$tr0ngP@ssw0rd!
Which of the following devices is used to connect different networks together?
Router
Which encryption tool is used to encrypt files stored in file storage cloud services?
Cryptomator
Which protocol provides secure communication over the Internet by encrypting data in transit?
HTTPS