Network Connectivity and ASLR Quiz
20 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which common types of network connectivity might you see in an IoT device?

  • Wireless
  • WAN
  • Wired
  • Bluetooth (correct)

What is ASLR and how does it affect the stack?

  • ASLR is a technique to randomize the addresses in virtual memory and it helps prevent buffer overflow exploits (correct)
  • ASLR is a technique to compress the stack and reduce memory usage
  • ASLR is a technique to encrypt the stack and protect data
  • ASLR is a technique to optimize the stack and improve performance

Which type of system is considered absolutely secure?

  • A system that is shut off and disconnected from all networks (correct)
  • A system that is frequently updated with the latest security patches
  • A system that is always connected to the internet
  • A system that has a strong firewall

Which concept of the CIA Triad is associated with reliability?

<p>Integrity (B)</p> Signup and view all the answers

A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most affected?

<p>Confidentiality (C)</p> Signup and view all the answers

What is an example of identification?

<p>A username is used for identification by uniquely identifying a person or subject (C)</p> Signup and view all the answers

Which type of access control model is a CAPTCHA an example of?

<p>Attribute-Based Access Control (ABAC) (D)</p> Signup and view all the answers

What is a sandbox?

<p>A sandbox is an isolated environment that enables users to run programs without affecting the system (D)</p> Signup and view all the answers

What element of the Parkerian Hexad is concerned with usefulness?

<p>Utility (D)</p> Signup and view all the answers

Which two attributes are included in the concept of risk?

<p>Integrity and Authenticity (D)</p> Signup and view all the answers

Which phase of the incident response (IR) process includes putting the system back better than the original state?

<p>Recovery (B)</p> Signup and view all the answers

Which combination of factors demonstrates multi-factor authentication?

<p>Something you know and something you have (A)</p> Signup and view all the answers

What is an example of identification?

<p>Assigning a user ID to a human being (C)</p> Signup and view all the answers

What is an example of authentication?

<p>Verifying a user or process with a PIN (D)</p> Signup and view all the answers

Which factors demonstrate multi-factor authentication?

<p>Something you know and something you have (A)</p> Signup and view all the answers

What is an objective for performing an audit?

<p>Ensuring compliance with applicable laws (B)</p> Signup and view all the answers

What are two common values for a network access control list (ACL)?

<p>Deny and allow (C)</p> Signup and view all the answers

A threat is something that has the potential to cause _______.

<p>Harm (D)</p> Signup and view all the answers

Vulnerabilities are weaknesses that can be used to cause _______.

<p>Harm (D)</p> Signup and view all the answers

What is the goal of the recovery phase in the incident response (IR) process?

<p>To recover to a better state than prior to the incident (B)</p> Signup and view all the answers

More Like This

IoT Devices and Cybersecurity Quiz
12 questions
IoT Device Security Quiz
10 questions
Cybersecurity - Introduction Quiz
10 questions
Complex Structure of IoT Devices
40 questions
Use Quizgecko on...
Browser
Browser