1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Which technology is considered private key cryptography?
Symmetric (private key)
A user runs an application that has been infected with malware that is less than 24 hours old. The malware then infects the operating system. Which safeguard should be implemented to prevent this type of attack?
Limit user account privileges.
Some malware hides itself by replacing some system administrator commands on a server, but the server continues to function normally for its users. Which component of the CIA triad has been compromised?
Integrity
An organization employs a VPN to safeguard its information. Which security principle is protected by a VPN?
Data in Motion
A user runs an application that has been infected with malware. This malware then performs a brute force attack on the built-in administrator account on Windows systems. The malware successfully cracks the password, and is used to compromise other systems in the environment. Which safeguard should be implemented to prevent this type of attack?
Modify the default user accounts.
Which security tool can evaluate web applications for cross-site scripting (XSS) vulnerabilities on a Linux web server?
Nikto
The network at a secure facility is entirely wired, and company policy bans the use of wireless connections. It is suspected that a rogue access point has been set up, providing unauthorized wireless access.Which cybersecurity tool should be used to detect whether the suspected rogue access point exists?
Kismet
Which tool should an application developer use to help identify input validation vulnerabilities?
A fuzzer
In addition to a username and corresponding password, a desktop application asks users to submit a special code. This code is produced by an application running on the users’ mobile phone. Which authentication technique is the phone application providing?
Something you have
Which component of the CIA triad is impacted if an attacker runs a sniffer?
Confidentiality
Which category of attack violates integrity by corrupting a hard drive?
Interruption
Which asymmetric cryptographic algorithm can provide confidentiality for data in motion?
RSA
An IT department manager is concerned that data being sent across the internet from the homes of remote employees is viewable by unauthorized users. To address this, the IT department implements virtual private networks (VPNs) using Internet Security Protocol (IPSec). Which category of data is protected by the IT department's use of an IPSec VPN?
Data in motion
A company has just completed an audit of disaster protection strategies. The company has decided it must keep and be able to retrieve backup data for a period of 30 years. The company has implemented tape backups using 8mm digital audio tapes. Which factor could impact the company’s ability to access information from the backup tapes?
Technical obsolescence
A bank website accepts online loan applications. It requires applicants to review and sign a disclosure document explaining the organization’s information sharing practices. Which federal law protects consumer’s financial information?
GLBA