Cybersecurity Cryptography and DNS Quiz
28 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is an organization in a flood zone most likely to document concerns about the restoration of IT operations in?

  • Communications plan
  • Business continuity plan
  • Continuity of operations plan
  • Disaster recovery plan (correct)
  • When setting up new firewall rules, what should a security administrator adhere to?

  • Business continuity plan
  • Incident response procedure
  • Change management procedure (correct)
  • Disaster recovery plan
  • What is a likely recommendation in the engagement report after penetration testers left USB keys with malware in the company's parking lot?

  • Establish a procedure on identifying and reporting suspicious messages
  • Conduct an awareness campaign on the usage of removable media (correct)
  • Issue a user guidance program focused on vishing campaigns
  • Implement more complex password management practices
  • What type of plan would address concerns associated with restoration of IT operations in a flood zone?

    <p>Disaster recovery plan</p> Signup and view all the answers

    Which procedure should be followed when a security administrator is setting up new firewall rules?

    <p>Change management procedure</p> Signup and view all the answers

    What action would help prevent unauthorized access to company endpoints after a malware incident from USB keys?

    <p>Implement more complex password management practices</p> Signup and view all the answers

    Which cryptographic concept operates on a fixed length of bits?

    <p>Block cipher</p> Signup and view all the answers

    What is a common use case for a DNS sinkhole?

    <p>Capturing traffic to known-malicious domains</p> Signup and view all the answers

    Why is it difficult for attackers to decrypt passwords using a rainbow table attack?

    <p>Salting</p> Signup and view all the answers

    What does reducing data center area by creating virtual networking through automation describe?

    <p>IaC</p> Signup and view all the answers

    In cryptography, what technique involves expanding the length of stored passwords with random data?

    <p>Key stretching</p> Signup and view all the answers

    Which security measure can prevent attackers from accessing company network resources by redirecting them to non-existent destinations?

    <p>DNS sinkhole</p> Signup and view all the answers

    What would have prevented the unauthorized use of the local administrator account on a company's VPN appliance?

    <p>Changing the default password</p> Signup and view all the answers

    What method would help in securing web traffic for users experiencing browsing issues at the newly added DR site?

    <p>Deny cleartext web traffic</p> Signup and view all the answers

    In the context provided, what action could have mitigated the exploitation of an interactive process to gain access to restricted areas?

    <p>Privilege escalation</p> Signup and view all the answers

    Which approach would be effective in enhancing security measures for the network at the DR site?

    <p>Using secure management protocols</p> Signup and view all the answers

    How can the risk of unauthorized logins be reduced on a remote management interface?

    <p>Using complex and unique passwords</p> Signup and view all the answers

    What security measure is crucial for preventing unauthorized access in a network environment?

    <p>Utilizing role-based access control</p> Signup and view all the answers

    What protective measure should a security administrator implement to protect the environment from the malware described in the text?

    <p>Implement a heuristic behavior-detection solution.</p> Signup and view all the answers

    What was the outcome of Joe clicking on the email link in the text?

    <p>His workstation got infected and spread the virus to network shares.</p> Signup and view all the answers

    Why did the protective measures fail to stop the virus in the text?

    <p>The virus evaded detection.</p> Signup and view all the answers

    What did the security engineer notice about the IP address of a vendor website in the log files?

    <p>It changed for eight hours one week earlier.</p> Signup and view all the answers

    Which attack was MOST likely used based on the change in the vendor website's IP address in the text?

    <p>Man-in-the-middle attack</p> Signup and view all the answers

    What does CASB stand for in the context of protecting network shares?

    <p>Cloud Application Security Broker</p> Signup and view all the answers

    What is the purpose of creating a checksum of an affected subject's email file during a forensic investigation?

    <p>Integrity</p> Signup and view all the answers

    In the context of a software company using a shared codebase, what is the likely result of having deactivated but unused features present in the code?

    <p>Dead code</p> Signup and view all the answers

    What is the potential risk highlighted in the security audit of an organization where most IT staff members have domain administrator credentials and do not change passwords regularly?

    <p>Reviewing the domain administrator group, removing unnecessary administrators, and rotating passwords</p> Signup and view all the answers

    When multiple projects share a common codebase in a software company, what could be a consequence of not removing unused features?

    <p>Code bloat</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser