Network Connectivity and ASLR Quiz
20 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which common types of network connectivity might you see in an IoT device?

  • Wireless
  • WAN
  • Wired
  • Bluetooth (correct)
  • What is ASLR and how does it affect the stack?

  • ASLR is a technique to randomize the addresses in virtual memory and it helps prevent buffer overflow exploits (correct)
  • ASLR is a technique to compress the stack and reduce memory usage
  • ASLR is a technique to encrypt the stack and protect data
  • ASLR is a technique to optimize the stack and improve performance
  • Which type of system is considered absolutely secure?

  • A system that is shut off and disconnected from all networks (correct)
  • A system that is frequently updated with the latest security patches
  • A system that is always connected to the internet
  • A system that has a strong firewall
  • Which concept of the CIA Triad is associated with reliability?

    <p>Integrity</p> Signup and view all the answers

    A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most affected?

    <p>Confidentiality</p> Signup and view all the answers

    What is an example of identification?

    <p>A username is used for identification by uniquely identifying a person or subject</p> Signup and view all the answers

    Which type of access control model is a CAPTCHA an example of?

    <p>Attribute-Based Access Control (ABAC)</p> Signup and view all the answers

    What is a sandbox?

    <p>A sandbox is an isolated environment that enables users to run programs without affecting the system</p> Signup and view all the answers

    What element of the Parkerian Hexad is concerned with usefulness?

    <p>Utility</p> Signup and view all the answers

    Which two attributes are included in the concept of risk?

    <p>Integrity and Authenticity</p> Signup and view all the answers

    Which phase of the incident response (IR) process includes putting the system back better than the original state?

    <p>Recovery</p> Signup and view all the answers

    Which combination of factors demonstrates multi-factor authentication?

    <p>Something you know and something you have</p> Signup and view all the answers

    What is an example of identification?

    <p>Assigning a user ID to a human being</p> Signup and view all the answers

    What is an example of authentication?

    <p>Verifying a user or process with a PIN</p> Signup and view all the answers

    Which factors demonstrate multi-factor authentication?

    <p>Something you know and something you have</p> Signup and view all the answers

    What is an objective for performing an audit?

    <p>Ensuring compliance with applicable laws</p> Signup and view all the answers

    What are two common values for a network access control list (ACL)?

    <p>Deny and allow</p> Signup and view all the answers

    A threat is something that has the potential to cause _______.

    <p>Harm</p> Signup and view all the answers

    Vulnerabilities are weaknesses that can be used to cause _______.

    <p>Harm</p> Signup and view all the answers

    What is the goal of the recovery phase in the incident response (IR) process?

    <p>To recover to a better state than prior to the incident</p> Signup and view all the answers

    More Like This

    Understanding IoT Devices
    5 questions

    Understanding IoT Devices

    MatchlessForethought avatar
    MatchlessForethought
    IoT Devices and Cybersecurity Quiz
    12 questions
    IoT Device Security Quiz
    10 questions
    Cybersecurity - Introduction Quiz
    10 questions
    Use Quizgecko on...
    Browser
    Browser