Security + Flashcards

1
Q

Which type of attack involves intercepting and modifying communications between two parties without their knowledge?

A

Man-in-the-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a zero-day exploit?

A

An exploit used before a vulnerability is publicly known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of malware encrypts a victim’s files and demands payment for decryption?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary purpose of a SIEM solution?

A

To aggregate and analyze log data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following tools can be used to scan a network for open ports and vulnerabilities?

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of device acts as a buffer to prevent unauthorized traffic from reaching the internal network?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the principle of ‘least privilege’?

A

Users should only have the minimum access necessary to perform their duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a best practice for securing cloud environments?

A

Encrypting sensitive data in transit and at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which protocol is commonly used to secure communication between a web server and a client?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between authentication and authorization?

A

Authentication verifies identity; authorization determines access levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an example of multifactor authentication?

A

Smart card and PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a role-based access control (RBAC) system?

A

Users are assigned permissions based on their roles within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the first step in the risk management process?

A

Risk identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an example of a compensating control?

A

Requiring a secondary approval process for transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between a quantitative and qualitative risk assessment?

A

Quantitative measures impact in numerical terms; qualitative uses subjective ratings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is phishing?

A

A social engineering attack to trick users into revealing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the primary purpose of a denial-of-service (DoS) attack?

A

To disrupt the availability of a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does an SQL injection attack exploit?

A

A vulnerability in database queries to execute malicious SQL statements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a botnet?

A

A network of compromised devices controlled by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is tailgating?

A

An attacker following an authorized person into a secured area without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the primary function of a VPN?

A

To create a secure, encrypted connection over an untrusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which protocol does SSH replace for secure remote access?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does a honeypot do?

A

Attracts attackers to monitor their behavior and gather intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of a vulnerability scanner?

A

To identify and report security vulnerabilities in systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the difference between a black-box and white-box penetration test?

A

Black-box tests have no prior knowledge of the system; white-box tests have full knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the purpose of network segmentation?

A

To limit access and reduce the potential spread of attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a DMZ in network security?

A

A demilitarized zone that separates internal networks from external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the function of load balancers in a network?

A

To distribute traffic evenly across multiple servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the main advantage of using Infrastructure as Code (IaC)?

A

Automated, consistent configuration management of systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the difference between symmetric and asymmetric encryption?

A

Symmetric uses one key for encryption and decryption; asymmetric uses a key pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is single sign-on (SSO)?

A

A system that allows users to log in once and access multiple applications.

32
Q

What is the purpose of a password policy?

A

To enforce secure and consistent password management practices.

33
Q

What is two-factor authentication (2FA)?

A

An authentication process requiring two forms of verification.

34
Q

What is privilege escalation?

A

Gaining unauthorized access to higher-level privileges within a system.

35
Q

What is the purpose of a federated identity system?

A

To enable a single identity across multiple organizations or systems.

36
Q

What is risk mitigation?

A

The process of reducing the impact or likelihood of a risk.

37
Q

What is the purpose of an incident response plan?

A

To provide a structured approach to handling security incidents.

38
Q

What is the primary goal of business continuity planning?

A

To ensure critical operations continue during a disruption.

39
Q

What is an acceptable use policy (AUP)?

A

A document outlining the rules for using an organization’s resources.

40
Q

What is the difference between residual and inherent risk?

A

Residual is the remaining risk after controls; inherent is the risk before controls.

41
Q

What is the purpose of a digital signature?

A

To provide integrity, authentication, and non-repudiation for digital messages.

42
Q

What is the function of a certificate authority (CA)?

A

To issue and manage digital certificates.

43
Q

What is hashing?

A

A one-way function that generates a fixed-size output from input data.

44
Q

What is Perfect Forward Secrecy (PFS)?

A

A feature that ensures session keys are not compromised even if the private key is.

45
Q

What does a public key infrastructure (PKI) enable?

A

Secure communication using certificates and encryption.

46
Q

What is a rootkit?

A

Malware that hides its presence to maintain privileged access to a system.

47
Q

What is spear phishing?

A

A targeted phishing attack aimed at a specific individual or organization.

48
Q

What does a logic bomb do?

A

Triggers a malicious action when specific conditions are met.

49
Q

What is cross-site scripting (XSS)?

A

An attack that injects malicious scripts into trusted websites.

50
Q

What is the primary goal of social engineering attacks?

A

To manipulate individuals into divulging confidential information.

51
Q

What does IDS stand for?

A

Intrusion Detection System.

52
Q

What is the primary purpose of a proxy server?

A

To act as an intermediary between users and the internet.

53
Q

What is Wireshark primarily used for?

A

Capturing and analyzing network traffic.

54
Q

What is the purpose of patch management?

A

To update systems and fix security vulnerabilities.

55
Q

What is the function of a sandbox in cybersecurity?

A

To isolate and analyze potentially malicious files or software.

56
Q

What is the purpose of endpoint detection and response (EDR) solutions?

A

To monitor and respond to threats on endpoint devices.

57
Q

What is geofencing?

A

Restricting access based on geographic location.

58
Q

What is the purpose of a security baseline?

A

To establish a minimum standard for system security.

59
Q

What is micro-segmentation?

A

Dividing a network into smaller, secure segments.

60
Q

What is the main benefit of using virtualization?

A

Efficient use of resources and isolation of environments.

61
Q

What is Kerberos used for?

A

A protocol for secure authentication in a network.

62
Q

What is a biometric factor in authentication?

A

A physical characteristic, such as a fingerprint or retinal scan.

63
Q

What is an access control list (ACL)?

A

A list of permissions defining access to resources.

64
Q

What is a token in IAM?

A

A physical or digital object used to prove identity or access rights.

65
Q

What is the primary function of LDAP?

A

To manage and access directory information services.

66
Q

What is the purpose of a risk register?

A

To document and track identified risks and their management.

67
Q

What is the difference between qualitative and quantitative risk analysis?

A

Qualitative is subjective; quantitative uses numerical data.

68
Q

What is a disaster recovery plan (DRP)?

A

A plan to restore systems and data after a major disruption.

69
Q

What is residual risk?

A

The risk remaining after controls have been applied.

70
Q

What is the purpose of a tabletop exercise?

A

To simulate a security incident for training purposes.

71
Q

What is the Advanced Encryption Standard (AES)?

A

A widely used symmetric encryption algorithm.

72
Q

What is a cryptographic key?

A

A value used to encrypt and decrypt data.

73
Q

What is a nonce?

A

A random or unique value used in cryptographic operations to prevent replay attacks.

74
Q

What is steganography?

A

Hiding information within other non-secret data, like images or audio files.

75
Q

What is the purpose of Transport Layer Security (TLS)?

A

To encrypt communication between a client and server.