Security + CIAT QUESTIONS Flashcards

exam

1
Q

CAPTCHA

A

used to mitigate high volume of fraudulent login attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Implementing input validation techniques

A

used to ensure that its web application is secure from SQL injection attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virtual Private Network (VPN)

A

used to ensure the integrity of data transferred between its internal network and remote employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Loss Prevention (DLP) system

A

focuses on detecting and preventing the loss, leakage, or misuse of data through breaches, exfiltration transmissions, and unauthorized use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Enabling MAC address filtering

A

It adds an extra layer of security by limiting the number of devices that can connect to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

prepared statements in database queries

A

used to ensure that its web server is **secure **from SQL injection attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

email gateway with anti-phishing features

A

reduce the risk of email phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

malware infections from USB drives* prevention (company issue)*

A

Disable USB ports on all company computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

issues with BYOD

A

protection against data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port security

A

You can specify the maximum number of MAC addresses that can be learned on a port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DHCP snooping

A

occurs when an attacker attempts to respond to DHCP requests and trying to list themselves (spoofs) as the default gateway or DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSID broadcast disabling

A

Unable to see SSID wi-fi network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

website is frequently targeted by SQL injection attacks.

A

defense is to use parameterized queries in the website code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

mobile device management (MDM) solution

A

ensure that mobile devices are secure against data leakage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data encryption

A

ensure the confidentiality and integrity of customer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FIRST line of defense against malware

A

Antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

unpatched vulnerability in a critical application.

A

Apply a temporary workaround

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Firewall rules

A

determine which types of traffic your firewall accepts and which are denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

File integrity monitoring

A

examines the integrity of sensitive files, registry keys, and folders within the host operating system and checks whether files have been altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

something they have and something they know.

A

Multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Implementing a CDN (Content Delivery Network)

A

ensures that no single server bears the brunt of an attack, reducing the likelihood of a successful DDoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

improve its email security

A

email encryption

23
Q

Spam filters

A

designed to identify emails that attackers or marketers use to send unwanted or dangerous content

24
Q

minimize security vulnerabilities of new software App

A

Conducting a code review

25
Q

A DNS filtering service

A

the process of using the Domain Name System to block malicious websites and filter out harmful or inappropriate content.

26
Q

HTTPS

A

is the secure version of HTTP,primary protocol used to send data between a web browser and a website. HTTPS is encrypted in order to increase security of data transfer.

27
Q

Role-based access control (RBAC)

A

the idea of assigning permissions to users based on their role within an organization

28
Q

Audit logging

A

the process of documenting activity within the software systems used across your organization

29
Q

User access controls

A

identifying a user based on their credentials and then authorizing the appropriate level of access once they are authenticated

30
Q

WPA2

A

secure its Wi-Fi network

31
Q

TKIP

A

a security protocol used in the IEEE 802.11 wireless networking standard

32
Q

WEP

A

was the first attempt at wireless protection. The aim was to add security to wireless networks by encrypting data.

33
Q

WPA

A

is a security standard for computing devices with wireless internet connections.

34
Q

Isolate the infected systems

A

several workstations on the network have been infected with malware.

35
Q

network perimeter _protect against external threats and attacks

A

A network-based firewall

36
Q

A host-based firewall

A

installed directly on individual networked devices to filter network traffic on a single device by inspecting both incoming and outgoing data.

37
Q

NIDS (Network Intrusion Detection System)

A

provide continuous network monitoring across on-premise and cloud infrastructure to detect malicious activity like policy violations, lateral movement or data exfiltration.

38
Q
A
39
Q

web content filtering solution

A

a technicque that blocks and screens access to inappropriate or unsafe web content.

40
Q

Degaussing

A

will not work on SSD only HDD

40
Q
A
41
Q

securely erase data from SSDs before disposal

A

Physical destruction

42
Q

Overwriting

A

cannot be used on a SSD

43
Q

WPA2-PSK encryption

A

uses a stronger encryption key and has built-in security features to prevent attacks like brute-force and dictionary attacks -prevent unauthorized access-

44
Q

leaking confidential information being leaked

A

Review access logs for unusual activity

45
Q

investigating a potential data breach.

A

Identification is the first step that needs to be taken

46
Q

Eradication

A

to get rid of something completely

47
Q

Data sovereignty

A

PRIMARY security concern, when transferring data

48
Q

FTP

A

standard communication protocol used for the transfer of computer files from a server to a client on a computer network

49
Q

SSL/TLS encryption

A

protocol or communication rule that allows computer systems to talk to each other on the internet safely.

50
Q

Data classification policy

A

identifies and helps protect sensitive/confidential data with a framework of rules, processes, and procedures for each class

51
Q

Protocol analyzer

A

is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel.

52
Q

network scanner

A

a software tool used for diagnostic and investigative purposes to find and categorize what devices are running on a network.