Podcast
Questions and Answers
What are the three main components of securing an asset?
What are the three main components of securing an asset?
- Prevention, Detection, Response
- Confidentiality, Integrity, Availability (correct)
- Encryption, Decryption, Hashing
- Authentication, Authorization, Accounting
What are two types of Brute-Force Password Cracking?
What are two types of Brute-Force Password Cracking?
- Hybrid & Rainbow Tables
- Shoulder Surfing & Eavesdropping
- Sequential & Dictionary (correct)
- Social Engineering & Phishing
What is a common attack that affects the confidentiality of data?
What is a common attack that affects the confidentiality of data?
- Shoulder Surfing
- Phishing
- Virus or Trojan Horses
- Password Cracking (correct)
Which type of attack affects the availability of a system or service?
Which type of attack affects the availability of a system or service?
What is the purpose of hashing in the context of security?
What is the purpose of hashing in the context of security?
What is the purpose of hashing in the context of security?
What is the purpose of hashing in the context of security?
Which type of attack affects the availability of a system or service?
Which type of attack affects the availability of a system or service?
What is a common attack that affects the confidentiality of data?
What is a common attack that affects the confidentiality of data?
Which of the following is an example of a security control to ensure integrity?
Which of the following is an example of a security control to ensure integrity?
In the context of security, what is the purpose of a Virtual Private Network (VPN)?
In the context of security, what is the purpose of a Virtual Private Network (VPN)?