Security Concepts Overview
22 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which is a key difference between Diffie-Hellman and RSA algorithms in secure communications?

  • Diffie-Hellman is only for encryption, RSA is only for digital signatures.
  • RSA is a type of firewall, while Diffie-Hellman is a type of antivirus.
  • Diffie-Hellman encrypts data at rest, RSA encrypts data in transit.
  • Diffie-Hellman is for key exchange, RSA is for key exchange and digital signatures. (correct)
  • A multinational corporation seeks to streamline its employees' access to a suite of internal and external cloud-based tools. They want a system where employees can log in once and have access to all necessary applications without needing to re-authenticate for each one. Which protocol is best suited for this type of enterprise-wide single sign-on (SSO) functionality?

  • Kerberos
  • OAuth (correct)
  • SAML (correct)
  • LDAP
  • An online retail website experiences variable traffic patterns, with periods of low activity and sudden bursts of high user demand, especially during sales events. Which cloud computing principle should be implemented to efficiently manage these fluctuating resource requirements?

  • Implementing a content delivery network (CDN)
  • Scalability
  • Elasticity (correct)
  • Upgrading server hardware
  • In this type of cyber attack, an attacker tries multiple usernames with a few commonly used passwords rather than trying many passwords on a single user. Which attack method does this describe?

    <p>Dictionary Attack</p> Signup and view all the answers

    A user unknowingly submits a web form on a banking website that transfers funds without their consent. This action was triggered by visiting another malicious website. What type of attack has occurred?

    <p>CSRF</p> Signup and view all the answers

    Megan, a cybersecurity specialist, is reviewing the port configuration of a critical server in her organization's network. An nmap scan reveals that TCP ports 21 (FTP), 443 (HTTPS), and 3389 (RDP) are open. Given the organization's strict security policy that mandates the use of secure, encrypted protocols for all remote connections and data transfer, Megan needs to determine which port(s) should be disabled to comply with this policy. Which port(s) should Megan disable to align with the organization's secure protocol requirements?

    <p>3389</p> Signup and view all the answers

    In the field of cryptography, one technique is particularly effective for ensuring both the integrity and authenticity of a message. This method combines a cryptographic hash function with a secret cryptographic key. What is this technique called?

    <p>HMAC</p> Signup and view all the answers

    In the realm of Bluetooth security vulnerabilities, which term best describes an attack where the attacker gains full access to a phone, installs a backdoor, and can initiate actions such as listening in on conversations or enabling call forwarding?

    <p>Bluebugging</p> Signup and view all the answers

    A web developer is implementing a system where users can log in to an application using their existing social media accounts. Which protocol is most suitable for allowing this type of third-party authentication without sharing the user's password with the application?

    <p>OAuth</p> Signup and view all the answers

    For a network administrator responsible for managing user accounts and permissions in a large organization, which solution is best suited for providing a centralized system to store, authenticate, and make user information accessible to various applications and services?

    <p>RADIUS</p> Signup and view all the answers

    In the context of cloud computing, an organization is considering various cloud deployment models to facilitate resource sharing among multiple organizations while maintaining separation from the public. Which cloud deployment model is most suitable for this scenario?

    <p>Community</p> Signup and view all the answers

    Which of the following cybersecurity frameworks is best suited for integrating networking and security services into a single, cloud-based platform to support the evolving secure access needs of organizations?

    <p>Secure Access Service Edge (SASE)</p> Signup and view all the answers

    A corporation is focusing on enhancing its security measures by isolating critical applications from potential threats within a shared physical server infrastructure. Which technology is MOST suitable for achieving effective isolation of these critical systems?

    <p>Containerization</p> Signup and view all the answers

    What is the primary objective of conducting an account audit in the context of Privileged Access Management (PAM)?

    <p>To ensure compliance with regulatory standards</p> Signup and view all the answers

    What is the primary role of the embedded certificate in a smart card used for authentication purposes in a network environment?

    <p>To hold the user's private key for secure authentication</p> Signup and view all the answers

    What is the primary purpose of EAP (Extensible Authentication Protocol) in a network security context?

    <p>To provide a method for two systems to create a secure encryption key for data transmission</p> Signup and view all the answers

    In a decentralized network where anyone can freely conduct financial transactions, how does blockchain technology ensure the integrity and security of these transactions?

    <p>By storing each transaction in an immutable chain of blocks, where each block is linked to the previous one through a unique hash.</p> Signup and view all the answers

    What term is used to describe the likelihood that a potential danger might exploit a weakness in a system, leading to negative consequences for an organization?

    <p>Risk</p> Signup and view all the answers

    Kevin, an IT security analyst a large corporation, receives an alert about unusual activity on an office workstation. He discovers a suspicious executable, sync_tool.exe, running in the background and a corresponding batch file scheduled in the Windows Task Scheduler to execute hourly. The batch file, named sync.bat and located at C:\Windows\Tasks, contains the following commands:

    1. @echo off
    2. rem Sync system data
    3. net use Z: \10.0.0.150\data_share /user:sync_user /p:yes
    4. Z:\tools\sync_tool.exe
    5. net use Z: /delete

    Kevin observes that sync_tool.exe is not part of any standard software on the workstation and notes its regular communication with external IP addresses. Evaluate the batch file and the behavior of sync_tool.exe to determine the likely type of malware present on the workstation.

    <p>Remote Access Trojan (RAT)</p> Signup and view all the answers

    When it comes to enforcing security policies and procedures for employees and systems in a company, which term best describes the responsibility and approach?

    <p>Due Care</p> Signup and view all the answers

    In a cybersecurity incident, an attacker captures encrypted authentication credentials as they are transmitted over a network. The attacker then uses these credentials later to impersonate the user and gain unauthorized system access. What type of attack does this scenario most closely represent?

    <p>Session Hijacking</p> Signup and view all the answers

    In the Zero Trust model, the Policy Decision Point (PDP) controls access to resources based on strict policies. What are its key components?

    <p>Policy Engine (PE) and Policy Administrator (PA)</p> Signup and view all the answers

    Study Notes

    Security Concepts

    • Diffie-Hellman vs. RSA: Diffie-Hellman is for encryption key exchange, while RSA is for key exchange and digital signatures.

    • Single Sign-On (SSO): SAML is a suitable protocol for enterprise-wide SSO.

    • Mobile Device Replacement: Consistent 5% annual increase in mobile device replacements can be used to predict future replacements.

    • Cloud Resource Management: Elasticity in cloud computing deals with fluctuating demand by adjusting resources dynamically.

    • Brute-Force Attack: This involves trying multiple usernames with common passwords.

    • Phishing Attack: This occurs when a user is tricked into clicking on a malicious link and performing an action, unknowingly compromising their data.

    • Port Configuration: Ports 21 (FTP) and 3389 (RDP) should be disabled for security.

    • HMAC: Combines a cryptographic hash function with a secret key for message integrity and authenticity.

    • Bluetooth Attacks: Bluejacking, Bluesnarfing, and Bluebugging are examples of vulnerabilities.

    • Third-party Authentication: OpenID Connect is an option for allowing user logins through social media without sharing passwords.

    • Network Management: RADIUS is used in centralizing user accounts and permissions in organizations.

    • Cloud Deployment Models: Public, private, community, and hybrid models.

    • Cybersecurity Frameworks: Secure Access Service Edge (SASE) integrates networking and security.

    • Security Isolation: Network segmentation with VLANs isolates applications from other systems on the same physical infrastructure.

    • Account Audit: Primarily for compliance and identifying privilege creep.

    • Smart Card Authentication: TPM is used for storing security keys and managing authentications.

    • EAP: A method for two systems to create a secure encryption key for data transmission.

    • Risk Assessment: Risk is the likelihood of a threat occurring times the impact.

    • Data Loss: Recovery Point Objective (RPO) is the maximum acceptable amount of time of data loss.

    • Network Connections: netstat can be used to discover active connections on a server.

    • Password Policies: Password complexity and geofencing are combined in enforcement.

    • Security best practices: Ensure your devices use up-to-date systems to avoid cyber vulnerabilities.

    • Port scanning: nmap can be used to determine open ports on a server.

    • Cryptography: HMAC is a method used in cryptography to ensure authenticity and integrity of messages.

    • Change Management: SOP is used to consistently apply changes in the same way to achieve uniform implementations.

    • Cybersecurity: A comprehensive solution such as SIEM is used to detect threats spanning network, email, endpoints and various areas.

    • Cryptographic Hash Functions: SHA-3 is suitable for digital signatures in high-volume environments.

    • Biometric Systems: Lower Crossover Error Rate (CER) is desirable.

    • Security Protocols: TLS is needed to manage secure communications over the internet.

    • Endpoint security: Protecting sensitive data involves protecting endpoints and using strong encryption.

    • Supply Chain Security: Exploiting vulnerabilities in the supply chain directly impacts organizations.

    • Wireless Security: WPS vulnerability is exploitable.

    • Security Control: Mantrap at the entrance of a data center is a managerial solution

    • Threats: Attackers gain access to network resources to compromise data or security.

    • Vulnerabilities and Threats: There are many variations in how attackers gain access, such as vulnerabilities in software.

    • Malware: Remote Access Trojans (RATs) are common malware that give attackers remote access to compromised computers.

    • Data breaches: A successful data breach is an attack that can be used to compromise a system.

    • Security policies: Policies that are followed ensure consistent methods to prevent certain attacks.

    • Attack strategies: Pretexting is one of many possible attack strategies, and must be recognized as a possible threat.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Explore fundamental security concepts including encryption methods like Diffie-Hellman and RSA, Single Sign-On protocols, and protection against phishing attacks. This quiz also covers mobile device management and cloud resource dynamics. Test your knowledge on the essential elements of cybersecurity.

    More Like This

    Use Quizgecko on...
    Browser
    Browser