Cybersecurity Threats and Tools
28 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a type of malware?

  • Trojan Horse
  • Virus
  • Firewall (correct)
  • Worm
  • What does a DoS attack aim to achieve?

  • Stealing sensitive information from a system.
  • Modifying data on a system without authorization.
  • Gaining unauthorized access to a system.
  • Making a system unavailable to legitimate users. (correct)
  • Which access control model grants permissions based on the user's role within an organization?

  • RBAC (Role-Based Access Control) (correct)
  • DAC (Discretionary Access Control)
  • MAC (Mandatory Access Control)
  • ABAC (Attribute-Based Access Control)
  • Which encryption method uses a single key for both encryption and decryption?

    <p>Symmetric encryption (C)</p> Signup and view all the answers

    What is the primary purpose of a SIEM (Security Information and Event Management) system?

    <p>Detecting and responding to security incidents. (D)</p> Signup and view all the answers

    Which security framework provides a comprehensive set of guidelines for information security management?

    <p>ISO 27001 (C)</p> Signup and view all the answers

    What is the primary function of a VPN (Virtual Private Network)?

    <p>Providing secure remote access to a network. (B)</p> Signup and view all the answers

    Which of the following is NOT a common step in the incident response process?

    <p>Optimization (D)</p> Signup and view all the answers

    Which form of malware is designed to replicate itself by inserting copies into other programs?

    <p>Viruses (B)</p> Signup and view all the answers

    What type of attack seeks to make systems unavailable by overwhelming them?

    <p>Distributed Denial of Service (A)</p> Signup and view all the answers

    Which security tool is primarily used to monitor and control network traffic?

    <p>Firewall (C)</p> Signup and view all the answers

    Which social engineering tactic involves using a pretext to manipulate someone into divulging confidential information?

    <p>Pretexting (B)</p> Signup and view all the answers

    What is the primary purpose of vulnerability assessment?

    <p>To identify potential weaknesses in security (D)</p> Signup and view all the answers

    Which model is recognized as a framework to guide organizations in managing sensitive information?

    <p>ISO/IEC 27001 (A)</p> Signup and view all the answers

    What is a common characteristic of a Man-in-the-Middle attack?

    <p>Intercepting communications between two parties (A)</p> Signup and view all the answers

    Which of the following is a key concept in secure network design?

    <p>Defense-in-Depth (C)</p> Signup and view all the answers

    Which technology helps analyze security data from multiple sources in real-time?

    <p>Security Information and Event Management (B)</p> Signup and view all the answers

    What type of malware is disguised as legitimate software?

    <p>Trojan (C)</p> Signup and view all the answers

    What is primarily required for Two-Factor Authentication (2FA) to be effective?

    <p>Two form factors of authentication (B)</p> Signup and view all the answers

    Which of the following best illustrates an example of Mandatory Access Control (MAC)?

    <p>Access enforced by a system administrator on a need-to-know basis (A)</p> Signup and view all the answers

    Which cryptographic protocol is primarily used to secure web communications?

    <p>SSL/TLS (B)</p> Signup and view all the answers

    What is the main role of digital certificates in Public Key Infrastructure (PKI)?

    <p>To verify the authenticity of users and devices (A)</p> Signup and view all the answers

    Which of the following concepts focuses on the user account lifecycle management?

    <p>Identity Management (C)</p> Signup and view all the answers

    What is the purpose of compliance regulations like GDPR and HIPAA?

    <p>To protect data privacy and establish security guidelines (C)</p> Signup and view all the answers

    Which step in the incident response process typically follows the detection and analysis phase?

    <p>Containment (B)</p> Signup and view all the answers

    What characterizes Role-Based Access Control (RBAC)?

    <p>Permissions are tied to defined user roles within the organization (A)</p> Signup and view all the answers

    What is the primary focus of business continuity and disaster recovery planning?

    <p>Ensuring operations can continue and recover following disruptions (D)</p> Signup and view all the answers

    Which of the following best describes the concept of Single Sign-On (SSO)?

    <p>A system that enables access to several applications with a single set of credentials (D)</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser