CSI_6_SCS Cyber Security Exam 2021/22
30 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of confidentiality?

  • Preventing unauthorized access to data (correct)
  • Detecting unauthorized access to data
  • Verifying the identity of users
  • Ensuring the accuracy of data
  • What is the purpose of encryption?

  • To ensure data integrity
  • To protect data from unauthorized access (correct)
  • To enhance system performance
  • To authenticate user identities
  • Why does a company require its users to change passwords regularly?

  • To improve network security (correct)
  • To improve system reliability
  • To enhance system performance
  • To reduce data storage
  • At which layer of the TCP/IP Model does IPSec work?

    <p>Network Layer</p> Signup and view all the answers

    What is the primary purpose of IPSec?

    <p>To provide security services</p> Signup and view all the answers

    What is cipher text?

    <p>Encrypted text</p> Signup and view all the answers

    Which algorithm is not used in asymmetric key cryptography?

    <p>Electronic code book algorithm</p> Signup and view all the answers

    What is the main difference between asymmetric key cryptography and symmetric key cryptography?

    <p>Key usage</p> Signup and view all the answers

    What is the primary goal of web application security?

    <p>To build websites to function as expected, even when under attack</p> Signup and view all the answers

    What does VPN stand for?

    <p>Virtual Private Network</p> Signup and view all the answers

    What is one of the security services provided by IPSec?

    <p>Message confidentiality</p> Signup and view all the answers

    What is an example of an industry standard asymmetric key cryptography algorithm?

    <p>RSA</p> Signup and view all the answers

    What is the primary function of SWIFT?

    <p>To provide a secure network for financial institutions to exchange information</p> Signup and view all the answers

    What happened in 2016 involving SWIFT and a Bangladeshi bank?

    <p>Hackers attempted to steal US$1 billion from a Bangladeshi bank</p> Signup and view all the answers

    What is a security weakness in SWIFT's private network?

    <p>A hacker breaking into a bank can access the network</p> Signup and view all the answers

    What is the goal of a penetration test of a bank's SWIFT gateway?

    <p>To test the bank's security measures and identify vulnerabilities</p> Signup and view all the answers

    What is a security measure used by banks on the SWIFT network?

    <p>Limiting transactions between particular parties</p> Signup and view all the answers

    What is a potential risk of a hacker breaking into a bank's system?

    <p>The hacker will have access to the SWIFT network</p> Signup and view all the answers

    What type of program captures keystrokes typed by the user and hides in the process list?

    <p>Keylogger</p> Signup and view all the answers

    What type of attack involves flooding a network with multiple IP addresses?

    <p>DDoS attack</p> Signup and view all the answers

    What type of malicious code is designed to 'explode' when certain conditions are met?

    <p>Logic bomb</p> Signup and view all the answers

    What type of attack is most likely to succeed in accessing hashed passwords?

    <p>Rainbow table attack</p> Signup and view all the answers

    What is the primary goal of adding a digital signature to emails?

    <p>Integrity and non-repudiation</p> Signup and view all the answers

    What type of encryption is typically used to encrypt a file on an encrypted USB drive?

    <p>Symmetric encryption</p> Signup and view all the answers

    Which open-source tool is used for scanning a network for active hosts and open ports?

    <p>Nmap</p> Signup and view all the answers

    What is the primary purpose of a keylogger?

    <p>To capture keystrokes</p> Signup and view all the answers

    Which aspect of cybersecurity is most affected by Distributed Denial of Service (DDoS) attacks?

    <p>Availability</p> Signup and view all the answers

    What is the term for a network of compromised computers used for malicious activities?

    <p>Botnet</p> Signup and view all the answers

    What is the process of challenging a user to prove their identity?

    <p>Authentication</p> Signup and view all the answers

    What type of attack involves using a list of precomputed hash values?

    <p>Rainbow table attack</p> Signup and view all the answers

    More Like This

    Information Systems Security Quiz
    20 questions
    Cyber Physical Systems Security Quiz
    6 questions
    ITM 100 Class 9: Securing Information Systems
    48 questions
    Use Quizgecko on...
    Browser
    Browser