CSI_6_SCS Cyber Security Exam 2021/22
30 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of confidentiality?

  • Preventing unauthorized access to data (correct)
  • Detecting unauthorized access to data
  • Verifying the identity of users
  • Ensuring the accuracy of data

What is the purpose of encryption?

  • To ensure data integrity
  • To protect data from unauthorized access (correct)
  • To enhance system performance
  • To authenticate user identities

Why does a company require its users to change passwords regularly?

  • To improve network security (correct)
  • To improve system reliability
  • To enhance system performance
  • To reduce data storage

At which layer of the TCP/IP Model does IPSec work?

<p>Network Layer (C)</p> Signup and view all the answers

What is the primary purpose of IPSec?

<p>To provide security services (D)</p> Signup and view all the answers

What is cipher text?

<p>Encrypted text (A)</p> Signup and view all the answers

Which algorithm is not used in asymmetric key cryptography?

<p>Electronic code book algorithm (D)</p> Signup and view all the answers

What is the main difference between asymmetric key cryptography and symmetric key cryptography?

<p>Key usage (B)</p> Signup and view all the answers

What is the primary goal of web application security?

<p>To build websites to function as expected, even when under attack (B)</p> Signup and view all the answers

What does VPN stand for?

<p>Virtual Private Network (D)</p> Signup and view all the answers

What is one of the security services provided by IPSec?

<p>Message confidentiality (B)</p> Signup and view all the answers

What is an example of an industry standard asymmetric key cryptography algorithm?

<p>RSA (D)</p> Signup and view all the answers

What is the primary function of SWIFT?

<p>To provide a secure network for financial institutions to exchange information (A)</p> Signup and view all the answers

What happened in 2016 involving SWIFT and a Bangladeshi bank?

<p>Hackers attempted to steal US$1 billion from a Bangladeshi bank (B)</p> Signup and view all the answers

What is a security weakness in SWIFT's private network?

<p>A hacker breaking into a bank can access the network (C)</p> Signup and view all the answers

What is the goal of a penetration test of a bank's SWIFT gateway?

<p>To test the bank's security measures and identify vulnerabilities (A)</p> Signup and view all the answers

What is a security measure used by banks on the SWIFT network?

<p>Limiting transactions between particular parties (C)</p> Signup and view all the answers

What is a potential risk of a hacker breaking into a bank's system?

<p>The hacker will have access to the SWIFT network (B)</p> Signup and view all the answers

What type of program captures keystrokes typed by the user and hides in the process list?

<p>Keylogger (C)</p> Signup and view all the answers

What type of attack involves flooding a network with multiple IP addresses?

<p>DDoS attack (D)</p> Signup and view all the answers

What type of malicious code is designed to 'explode' when certain conditions are met?

<p>Logic bomb (B)</p> Signup and view all the answers

What type of attack is most likely to succeed in accessing hashed passwords?

<p>Rainbow table attack (C)</p> Signup and view all the answers

What is the primary goal of adding a digital signature to emails?

<p>Integrity and non-repudiation (B)</p> Signup and view all the answers

What type of encryption is typically used to encrypt a file on an encrypted USB drive?

<p>Symmetric encryption (C)</p> Signup and view all the answers

Which open-source tool is used for scanning a network for active hosts and open ports?

<p>Nmap (A)</p> Signup and view all the answers

What is the primary purpose of a keylogger?

<p>To capture keystrokes (A)</p> Signup and view all the answers

Which aspect of cybersecurity is most affected by Distributed Denial of Service (DDoS) attacks?

<p>Availability (B)</p> Signup and view all the answers

What is the term for a network of compromised computers used for malicious activities?

<p>Botnet (B)</p> Signup and view all the answers

What is the process of challenging a user to prove their identity?

<p>Authentication (A)</p> Signup and view all the answers

What type of attack involves using a list of precomputed hash values?

<p>Rainbow table attack (D)</p> Signup and view all the answers

More Like This

Information Systems Security Quiz
20 questions
Cyber Physical Systems Security Quiz
6 questions
ITM 100 Class 9: Securing Information Systems
48 questions
Use Quizgecko on...
Browser
Browser