Podcast
Questions and Answers
Which of the following best describes the concept of confidentiality in information security?
Which of the following best describes the concept of confidentiality in information security?
- Protecting against attacks on computer storage systems
- Ensuring that data is stored and transferred as intended
- Controlling access to data based on certain criteria (correct)
- Assessing vulnerabilities, threats, and risks in a network
What is the main focus of cybersecurity?
What is the main focus of cybersecurity?
- Ensuring data is stored and processed with CIA attributes
- Protecting against attacks on computer storage and processing systems (correct)
- Performing assessments to determine network security
- Developing security policies and controls
What does the term 'hardening' refer to in the context of information security?
What does the term 'hardening' refer to in the context of information security?
- Developing security policies and controls
- Controlling access to data based on certain criteria
- Making a system more secure (correct)
- Ensuring data is stored and transferred as intended
Which one of the following best describes a vulnerability?
Which one of the following best describes a vulnerability?
What is the relationship between threat, vulnerability, and risk?
What is the relationship between threat, vulnerability, and risk?
What is the purpose of a configuration baseline?
What is the purpose of a configuration baseline?
What is an exploit?
What is an exploit?
Which of the following techniques involves searching through an organization's garbage to find useful documents?
Which of the following techniques involves searching through an organization's garbage to find useful documents?
What type of attack involves observing someone entering a password or PIN by watching them?
What type of attack involves observing someone entering a password or PIN by watching them?
Which technique involves entering a secure area without authorization by closely following behind someone who has been allowed access?
Which technique involves entering a secure area without authorization by closely following behind someone who has been allowed access?
What social engineering technique uses spoofed electronic communications to make them seem authentic to the victim?
What social engineering technique uses spoofed electronic communications to make them seem authentic to the victim?
Which type of phishing attack is specifically targeted towards upper levels of management in an organization?
Which type of phishing attack is specifically targeted towards upper levels of management in an organization?
What type of phishing attack is conducted through a voice channel, such as telephone or VoIP?
What type of phishing attack is conducted through a voice channel, such as telephone or VoIP?
In which type of phishing attack does the attacker use a rogue wireless access point to try to harvest credentials?
In which type of phishing attack does the attacker use a rogue wireless access point to try to harvest credentials?
Why is it important to be able to describe and analyze behaviors in modern cybersecurity threats?
Why is it important to be able to describe and analyze behaviors in modern cybersecurity threats?
Which of the following is true about zero-day vulnerabilities?
Which of the following is true about zero-day vulnerabilities?
What is an unpatched system?
What is an unpatched system?
What is a legacy or end of life (EOL) system?
What is a legacy or end of life (EOL) system?
What is social engineering?
What is social engineering?
Which of the following is NOT a method used in DoS attacks?
Which of the following is NOT a method used in DoS attacks?
What is the purpose of a DoS attack?
What is the purpose of a DoS attack?
What is the difference between DoS and DDoS attacks?
What is the difference between DoS and DDoS attacks?
Which of the following best describes an insider threat actor?
Which of the following best describes an insider threat actor?
What is the main goal of footprinting threats?
What is the main goal of footprinting threats?
What is a spoofing threat?
What is a spoofing threat?
What is an on-path attack?
What is an on-path attack?
Which of the following is a common method for threat actors to gain access to a network?
Which of the following is a common method for threat actors to gain access to a network?
What can threat actors do if they gain access to a network via an on-path or malware attack?
What can threat actors do if they gain access to a network via an on-path or malware attack?
How is a password typically stored and transmitted securely?
How is a password typically stored and transmitted securely?
Which of the following best describes the purpose of a digital signature?
Which of the following best describes the purpose of a digital signature?
What is the role of key exchange in secure communication?
What is the role of key exchange in secure communication?
What is the purpose of an ephemeral key in key exchange?
What is the purpose of an ephemeral key in key exchange?
Which cryptographic technology uses a single secret key for both encryption and decryption?
Which cryptographic technology uses a single secret key for both encryption and decryption?
Which cryptographic technology uses a key pair consisting of a private key and a public key?
Which cryptographic technology uses a key pair consisting of a private key and a public key?
Which cryptographic technology is used for secure storage of data where the original value does not need to be recovered?
Which cryptographic technology is used for secure storage of data where the original value does not need to be recovered?
Which cryptographic hash algorithm is being phased out of use?
Which cryptographic hash algorithm is being phased out of use?
Which of the following best describes a nonpersistent XSS attack?
Which of the following best describes a nonpersistent XSS attack?
What is the main goal of a stored/persistent XSS attack?
What is the main goal of a stored/persistent XSS attack?
In a SQL injection attack, how does the threat actor modify the SQL statements?
In a SQL injection attack, how does the threat actor modify the SQL statements?
What is the purpose of encryption in information security?
What is the purpose of encryption in information security?
Which of the following is NOT a common password hash file or database that a threat actor might obtain from a local system?
Which of the following is NOT a common password hash file or database that a threat actor might obtain from a local system?
Which technique does a password cracker use to try to identify a password from a cryptographic hash?
Which technique does a password cracker use to try to identify a password from a cryptographic hash?
Which method of running code in a web application modifies the web page before it is displayed to the user?
Which method of running code in a web application modifies the web page before it is displayed to the user?
What type of vulnerability in web apps is commonly exploited by a cross-site scripting (XSS) attack?
What type of vulnerability in web apps is commonly exploited by a cross-site scripting (XSS) attack?