Security + Flashcards
Which type of attack involves intercepting and modifying communications between two parties without their knowledge?
Man-in-the-Middle
What is a zero-day exploit?
An exploit used before a vulnerability is publicly known
What type of malware encrypts a victim’s files and demands payment for decryption?
Ransomware
What is the primary purpose of a SIEM solution?
To aggregate and analyze log data
Which of the following tools can be used to scan a network for open ports and vulnerabilities?
Nessus
Which type of device acts as a buffer to prevent unauthorized traffic from reaching the internal network?
Firewall
What is the principle of ‘least privilege’?
Users should only have the minimum access necessary to perform their duties.
Which of the following is a best practice for securing cloud environments?
Encrypting sensitive data in transit and at rest
Which protocol is commonly used to secure communication between a web server and a client?
HTTPS
What is the difference between authentication and authorization?
Authentication verifies identity; authorization determines access levels.
Which of the following is an example of multifactor authentication?
Smart card and PIN
What is a role-based access control (RBAC) system?
Users are assigned permissions based on their roles within an organization.
What is the first step in the risk management process?
Risk identification
Which of the following is an example of a compensating control?
Requiring a secondary approval process for transactions
What is the difference between a quantitative and qualitative risk assessment?
Quantitative measures impact in numerical terms; qualitative uses subjective ratings.
What is phishing?
A social engineering attack to trick users into revealing sensitive information.
What is the primary purpose of a denial-of-service (DoS) attack?
To disrupt the availability of a system or network.
What does an SQL injection attack exploit?
A vulnerability in database queries to execute malicious SQL statements.
What is a botnet?
A network of compromised devices controlled by an attacker.
What is tailgating?
An attacker following an authorized person into a secured area without authorization.
What is the primary function of a VPN?
To create a secure, encrypted connection over an untrusted network.
Which protocol does SSH replace for secure remote access?
Telnet
What does a honeypot do?
Attracts attackers to monitor their behavior and gather intelligence.
What is the purpose of a vulnerability scanner?
To identify and report security vulnerabilities in systems and networks.
What is the difference between a black-box and white-box penetration test?
Black-box tests have no prior knowledge of the system; white-box tests have full knowledge.
What is the purpose of network segmentation?
To limit access and reduce the potential spread of attacks.
What is a DMZ in network security?
A demilitarized zone that separates internal networks from external networks.
What is the function of load balancers in a network?
To distribute traffic evenly across multiple servers.
What is the main advantage of using Infrastructure as Code (IaC)?
Automated, consistent configuration management of systems.
What is the difference between symmetric and asymmetric encryption?
Symmetric uses one key for encryption and decryption; asymmetric uses a key pair.