Podcast
Questions and Answers
Which common types of network connectivity might you see in an IoT device?
Which common types of network connectivity might you see in an IoT device?
- Wireless
- WAN
- Wired
- Bluetooth (correct)
What is ASLR and how does it affect the stack?
What is ASLR and how does it affect the stack?
- ASLR is a technique to randomize the addresses in virtual memory and it helps prevent buffer overflow exploits (correct)
- ASLR is a technique to compress the stack and reduce memory usage
- ASLR is a technique to encrypt the stack and protect data
- ASLR is a technique to optimize the stack and improve performance
Which type of system is considered absolutely secure?
Which type of system is considered absolutely secure?
- A system that is shut off and disconnected from all networks (correct)
- A system that is frequently updated with the latest security patches
- A system that is always connected to the internet
- A system that has a strong firewall
Which concept of the CIA Triad is associated with reliability?
Which concept of the CIA Triad is associated with reliability?
A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most affected?
A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most affected?
What is an example of identification?
What is an example of identification?
Which type of access control model is a CAPTCHA an example of?
Which type of access control model is a CAPTCHA an example of?
What is a sandbox?
What is a sandbox?
What element of the Parkerian Hexad is concerned with usefulness?
What element of the Parkerian Hexad is concerned with usefulness?
Which two attributes are included in the concept of risk?
Which two attributes are included in the concept of risk?
Which phase of the incident response (IR) process includes putting the system back better than the original state?
Which phase of the incident response (IR) process includes putting the system back better than the original state?
Which combination of factors demonstrates multi-factor authentication?
Which combination of factors demonstrates multi-factor authentication?
What is an example of identification?
What is an example of identification?
What is an example of authentication?
What is an example of authentication?
Which factors demonstrate multi-factor authentication?
Which factors demonstrate multi-factor authentication?
What is an objective for performing an audit?
What is an objective for performing an audit?
What are two common values for a network access control list (ACL)?
What are two common values for a network access control list (ACL)?
A threat is something that has the potential to cause _______.
A threat is something that has the potential to cause _______.
Vulnerabilities are weaknesses that can be used to cause _______.
Vulnerabilities are weaknesses that can be used to cause _______.
What is the goal of the recovery phase in the incident response (IR) process?
What is the goal of the recovery phase in the incident response (IR) process?