7 Questions
Which encryption method uses the same key for both encryption and decryption?
Symmetric encryption
What is the primary purpose of intrusion detection systems (IDS)?
To detect and respond to unauthorized network activity
What does SSL stand for in the context of network security?
Secure Socket Layer
Which type of attack involves overwhelming a system or network with a flood of traffic?
DDoS attack
What is the principle of least privilege in the context of access control?
Granting users only the access rights and permissions needed to perform their tasks
What is the main function of a packet filtering firewall?
Inspect each packet and make decisions based on the state of the connection
What is the purpose of operating system (OS) hardening?
To remove unnecessary functions and features to reduce the attack surface
Test your knowledge of information security fundamentals including the CIA Triad, Parkerian Hexad, attack types, risk management, incident response, authentication, access control, cryptography, and more.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free