🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

CSI_6_SCS Cyber Security Exam 2021/22
30 Questions
2 Views

CSI_6_SCS Cyber Security Exam 2021/22

Created by
@UsefulGreatWallOfChina

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of confidentiality?

  • Preventing unauthorized access to data (correct)
  • Detecting unauthorized access to data
  • Verifying the identity of users
  • Ensuring the accuracy of data
  • What is the purpose of encryption?

  • To ensure data integrity
  • To protect data from unauthorized access (correct)
  • To enhance system performance
  • To authenticate user identities
  • Why does a company require its users to change passwords regularly?

  • To improve network security (correct)
  • To improve system reliability
  • To enhance system performance
  • To reduce data storage
  • At which layer of the TCP/IP Model does IPSec work?

    <p>Network Layer</p> Signup and view all the answers

    What is the primary purpose of IPSec?

    <p>To provide security services</p> Signup and view all the answers

    What is cipher text?

    <p>Encrypted text</p> Signup and view all the answers

    Which algorithm is not used in asymmetric key cryptography?

    <p>Electronic code book algorithm</p> Signup and view all the answers

    What is the main difference between asymmetric key cryptography and symmetric key cryptography?

    <p>Key usage</p> Signup and view all the answers

    What is the primary goal of web application security?

    <p>To build websites to function as expected, even when under attack</p> Signup and view all the answers

    What does VPN stand for?

    <p>Virtual Private Network</p> Signup and view all the answers

    What is one of the security services provided by IPSec?

    <p>Message confidentiality</p> Signup and view all the answers

    What is an example of an industry standard asymmetric key cryptography algorithm?

    <p>RSA</p> Signup and view all the answers

    What is the primary function of SWIFT?

    <p>To provide a secure network for financial institutions to exchange information</p> Signup and view all the answers

    What happened in 2016 involving SWIFT and a Bangladeshi bank?

    <p>Hackers attempted to steal US$1 billion from a Bangladeshi bank</p> Signup and view all the answers

    What is a security weakness in SWIFT's private network?

    <p>A hacker breaking into a bank can access the network</p> Signup and view all the answers

    What is the goal of a penetration test of a bank's SWIFT gateway?

    <p>To test the bank's security measures and identify vulnerabilities</p> Signup and view all the answers

    What is a security measure used by banks on the SWIFT network?

    <p>Limiting transactions between particular parties</p> Signup and view all the answers

    What is a potential risk of a hacker breaking into a bank's system?

    <p>The hacker will have access to the SWIFT network</p> Signup and view all the answers

    What type of program captures keystrokes typed by the user and hides in the process list?

    <p>Keylogger</p> Signup and view all the answers

    What type of attack involves flooding a network with multiple IP addresses?

    <p>DDoS attack</p> Signup and view all the answers

    What type of malicious code is designed to 'explode' when certain conditions are met?

    <p>Logic bomb</p> Signup and view all the answers

    What type of attack is most likely to succeed in accessing hashed passwords?

    <p>Rainbow table attack</p> Signup and view all the answers

    What is the primary goal of adding a digital signature to emails?

    <p>Integrity and non-repudiation</p> Signup and view all the answers

    What type of encryption is typically used to encrypt a file on an encrypted USB drive?

    <p>Symmetric encryption</p> Signup and view all the answers

    Which open-source tool is used for scanning a network for active hosts and open ports?

    <p>Nmap</p> Signup and view all the answers

    What is the primary purpose of a keylogger?

    <p>To capture keystrokes</p> Signup and view all the answers

    Which aspect of cybersecurity is most affected by Distributed Denial of Service (DDoS) attacks?

    <p>Availability</p> Signup and view all the answers

    What is the term for a network of compromised computers used for malicious activities?

    <p>Botnet</p> Signup and view all the answers

    What is the process of challenging a user to prove their identity?

    <p>Authentication</p> Signup and view all the answers

    What type of attack involves using a list of precomputed hash values?

    <p>Rainbow table attack</p> Signup and view all the answers

    More Quizzes Like This

    Information Systems Security Quiz
    20 questions
    Cyber Security Essentials Quiz
    5 questions

    Cyber Security Essentials Quiz

    PrestigiousChalcedony7655 avatar
    PrestigiousChalcedony7655
    Cyber Security Fundamentals
    12 questions

    Cyber Security Fundamentals

    ChivalrousAbstractArt avatar
    ChivalrousAbstractArt
    Information Systems Security and Cyber Warfare
    21 questions
    Use Quizgecko on...
    Browser
    Browser