Cybersecurity and Networking Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts in cybersecurity and networking.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Which cipher uses a pair of keys for encryption?

RSA

2
New cards

What type of encryption groups bits of information together before applying encryption?

Block Cipher

3
New cards

In public key encryption, which key is kept as public?

Encryption keys

4
New cards

What is the primary purpose of a hash function?

Convert inputs of any length into fixed-length outputs

5
New cards

In the chain of trust, which certificate belongs to the domain owner?

Primary certificate

6
New cards

Which mathematical expression would produce the most secure encryption?

number * number

7
New cards

What is the largest disadvantage of symmetric encryption?

Once keys have been exchanged, it is easy to lose them.

8
New cards

What access device prevents unauthorized individuals from entering a building by tailgating?

Mantrap

9
New cards

What can be used to hide browsing activity and mask IP address?

VPN

10
New cards

What is MAC filtering?

Process of allowing only devices with approved MAC addresses access to a network.

11
New cards

Which action is not possible using an Intrusion Detection System (IDS)?

Blocking a user from accessing a password file.

12
New cards

What term describes the process of increasing network redundancy and speed with a second server?

Load Balancing

13
New cards

What is a possible cause of computers starting to corrode and break down in a lab?

High humidity

14
New cards

What port should you check for secure encrypted Internet sites?

443

15
New cards

What protocol is used for fetching emails on mobile devices?

IMAP

16
New cards

What is the primary purpose of Mobile Device Management (MDM)?

To secure and control access to corporate data on mobile devices.

17
New cards

What security action represents logging each time employees access the intranet?

Accounting

18
New cards

What is the main objective of a Cross-Site Scripting (XSS) attack?

To trick the user into sharing sensitive information.

19
New cards

What is the primary purpose of regular data backups in malware recovery?

To provide a copy of essential data in case of an infection.

20
New cards

What kind of malware locks down your computer and demands payment?

Ransomware

21
New cards

What type of attack involves an email that looks slightly different than the usual URL?

Phishing

22
New cards

What does the existence of rainbow tables highlight the importance of?

Implementing additional security measures beyond passwords.

23
New cards

What method protects data in use?

Database encryption

24
New cards

What kind of malware allows attackers hidden access and control?

Rootkit

25
New cards

What type of attack involves quickly creating a patch to fix a known vulnerability?

Zero-Day attack

26
New cards

What does full-disk encryption mean?

Encrypting the entire storage device, including the operating system.

27
New cards

What is the main objective of a Distributed Denial-of-Service (DDoS) attack?

To overwhelm a server or network with traffic, rendering it unavailable to legitimate users.

28
New cards

What does active reconnaissance involve for penetration testing?

Scan for open ports and network vulnerabilities.

29
New cards

Which element is not typically included in a vulnerability scanning report?

A list of employees who potentially pose an internal threat.

30
New cards

What risk response involves not taking action due to low potential loss?

Risk acceptance

31
New cards

What is the primary purpose of data regulations?

To ensure customer privacy and protect sensitive information.

32
New cards

What term controls access to copyrighted material?

Digital Rights Management.

33
New cards

What is the primary reason for providing reinforcement during change management?

To motivate employees and encourage new behaviors.