1/32
Flashcards covering key concepts in cybersecurity and networking.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which cipher uses a pair of keys for encryption?
RSA
What type of encryption groups bits of information together before applying encryption?
Block Cipher
In public key encryption, which key is kept as public?
Encryption keys
What is the primary purpose of a hash function?
Convert inputs of any length into fixed-length outputs
In the chain of trust, which certificate belongs to the domain owner?
Primary certificate
Which mathematical expression would produce the most secure encryption?
number * number
What is the largest disadvantage of symmetric encryption?
Once keys have been exchanged, it is easy to lose them.
What access device prevents unauthorized individuals from entering a building by tailgating?
Mantrap
What can be used to hide browsing activity and mask IP address?
VPN
What is MAC filtering?
Process of allowing only devices with approved MAC addresses access to a network.
Which action is not possible using an Intrusion Detection System (IDS)?
Blocking a user from accessing a password file.
What term describes the process of increasing network redundancy and speed with a second server?
Load Balancing
What is a possible cause of computers starting to corrode and break down in a lab?
High humidity
What port should you check for secure encrypted Internet sites?
443
What protocol is used for fetching emails on mobile devices?
IMAP
What is the primary purpose of Mobile Device Management (MDM)?
To secure and control access to corporate data on mobile devices.
What security action represents logging each time employees access the intranet?
Accounting
What is the main objective of a Cross-Site Scripting (XSS) attack?
To trick the user into sharing sensitive information.
What is the primary purpose of regular data backups in malware recovery?
To provide a copy of essential data in case of an infection.
What kind of malware locks down your computer and demands payment?
Ransomware
What type of attack involves an email that looks slightly different than the usual URL?
Phishing
What does the existence of rainbow tables highlight the importance of?
Implementing additional security measures beyond passwords.
What method protects data in use?
Database encryption
What kind of malware allows attackers hidden access and control?
Rootkit
What type of attack involves quickly creating a patch to fix a known vulnerability?
Zero-Day attack
What does full-disk encryption mean?
Encrypting the entire storage device, including the operating system.
What is the main objective of a Distributed Denial-of-Service (DDoS) attack?
To overwhelm a server or network with traffic, rendering it unavailable to legitimate users.
What does active reconnaissance involve for penetration testing?
Scan for open ports and network vulnerabilities.
Which element is not typically included in a vulnerability scanning report?
A list of employees who potentially pose an internal threat.
What risk response involves not taking action due to low potential loss?
Risk acceptance
What is the primary purpose of data regulations?
To ensure customer privacy and protect sensitive information.
What term controls access to copyrighted material?
Digital Rights Management.
What is the primary reason for providing reinforcement during change management?
To motivate employees and encourage new behaviors.