1/115
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What does a Next Generation Firewall (NGFW) do?
Identifies applications sending packets through the firewall
Which device is used to balance network traffic among multiple servers?
Load balancer
What is the primary purpose of a spam filter?
Block spam emails
What is a demilitarized zone (DMZ) in network security?
An exposed, network-separated area providing an additional layer of security
What technology creates a secure connection over the internet?
VPN
Which of the following is not a function of a traditional firewall?
Encrypting data
What does NAT stand for in network settings?
Network Address Translation
What is a primary function of web security gateways?
To block malicious web content in real time
Which firewall operates at a higher level by identifying applications?
Next Generation Firewall
What role does a proxy server play in a network?
It acts as an intermediary between end users and the internet
What is the purpose of Mandatory Access Control (MAC)?
To restrict access based on fixed security attributes
Which Access Control model uses roles to define access permissions?
Role-Based Access Control
What does the principle of Least Privilege entail?
Users should have the minimum access necessary to perform their duties
What is an Access Control List (ACL)?
A set of rules that defines permissions for a resource
What does RADIUS stand for?
Remote Authentication Dial-In User Service
What is the purpose of job rotation in security?
To limit the time individuals have to compromise security
Which of the following is true about Kerberos?
It is an authentication protocol
What is implicit deny in access control?
Automatically denying access unless a rule explicitly allows it
What distinguishes Discretionary Access Control (DAC) from other models?
It allows owners to control access
What is an example of Rule-Based Access Control?
Access based on a set of directives such as time of day
What is the primary purpose of physical security?
To protect corporate assets from threats such as unauthorized entry
What does an access control vestibule typically feature?
Two locking doors
How are physical access controls similar to technical system security?
They both depend on similar access control fundamentals
What can environmental design help enhance in terms of physical security?
Security and crime prevention
Which type of sensor detects unauthorized entry via pressure-based detection?
Pressure sensor
What is a bollard designed to prevent?
Vehicle intrusion
What is encoded into RFID tags?
Information that can be read by radio waves
Which type of lock uses biometrics as a method of entry?
Biometric lock
What does a smart card typically contain?
Encrypted access information
Which physical barrier is used to control the perimeter of a high-security area?
Bollards
What is the main goal of using surveillance cameras in physical security?
Recording events for safety and security
What type of attack could be mitigated by effective physical security controls?
Unauthorized entry
What is the function of an access list in a security system?
To list personnel authorized to enter a secure facility
Which is a common feature of environmental design used in physical security?
Use of robust and tall fencing
How does a proximity card function?
By being brought near a proximity reader
Which component is critical in a biometric lock system?
A fingerprint or iris scan
What is typically the first line of defense in physical security?
Physical barriers
Which of the following is NOT a type of sensor used in physical security systems?
LIDAR sensor
What role do smart cards play in physical security?
Access control
What does RFID stand for?
Radio Frequency Identification
Why is zoning important in physical security?
It segregates areas to manage different security levels
What is the purpose of lighting in physical security settings?
To deter unauthorized access and enhance surveillance
Which method is NOT used by proximity cards for communication?
Ultrasound
In physical security, what does the term 'authentication' refer to?
The process of checking a person’s credentials
What are bollards typically made of?
Steel or concrete
What is the primary function of a Certificate Authority (CA)?
Issue and revoke digital certificates
What does a Certificate Revocation List (CRL) contain?
List of revoked certificates
Which protocol is used to securely transmit data over the internet?
SSH
What type of digital certificate is used to verify the identity of software publishers?
Class 3
Which PKI trust model involves a single CA that all parties trust implicitly?
Hierarchical Trust Model
What is a common protocol used to manage network devices remotely?
SNMP
Which type of DNS attack involves altering the DNS records in DNS servers?
DNS Hijacking
What is the main function of 802.1x?
Port-based network access control
Which protocol is used to secure file transfers over the internet?
SFTP
What is the primary purpose of VLAN Management?
Segment network traffic
What is "Bluejacking"?
Sending unsolicited messages over Bluetooth
Which encryption protocol was designed to replace WEP?
WPA
What is the function of MAC address filtering in wireless security?
Prevents unauthorized network access
Which technology allows wireless networks to be separated from one another?
Wireless VLANs
What does WPA2-PSK stand for?
Wi-Fi Protected Access 2 - Pre-Shared Key
What is the purpose of a firewall in a network environment?
To control and filter incoming and outgoing network traffic
What technique involves attackers placing themselves between the client and server to intercept communications?
Man-in-the-middle attack
Which of the following is a sign of a DNS attack?
Redirects to malicious websites
Which method is used to ensure that data sent over the internet is secure and encrypted?
HTTPS
What is the primary benefit of using virtual private networks (VPN)?
Providing a secure connection over a public network
Which access control model grants permissions based on a user's job role?
Role-Based Access Control (RBAC)
The principle of "least privilege" means
Users receive only the minimum access needed for their tasks
What is the purpose of "implicit deny" in an ACL?
To block all traffic unless explicitly allowed
Which protocol is commonly used for centralized authentication in Windows environments?
Kerberos
Separation of duties is designed to prevent
Single points of failure in security processes
Which authentication factor is considered "something you have"?
Smart card
A strong password policy should
Enforce a minimum length of 15 characters
What is the primary weakness of SMS-based two-factor authentication?
It can be intercepted through SIM swapping
Which biometric authentication method analyzes typing patterns?
Behavioral biometrics
Single Sign-On (SSO) improves security by
Reducing password fatigue and reuse
RAID 5 provides fault tolerance by
Using parity information spread across disks
Which team is responsible for assessing physical damage after a disaster?
Damage Assessment Team
The chain of custody in forensics is important because it
Documents who handled evidence and when
What is the primary purpose of disaster recovery exercises?
To evaluate the effectiveness of the DRP
EMI shielding protects systems from
Electromagnetic interference
A company using both RBAC and biometric authentication is implementing
Defense in depth
Which control would best protect against both physical theft and data breaches?
Full-disk encryption
During a power outage, which business continuity strategy is most critical?
Backup generators
Job rotation enhances security by:
Preventing any single person from having too much control
A comprehensive security strategy should include
Both preventive and recovery controls
What does the acronym ALE stand for in risk management?
Annualized Loss Expectancy
Which type of risk management transfers responsibility to a third party?
Risk transference
Which type of control involves the human element and administrative activities?
Operational
The Single Loss Expectancy (SLE) is calculated using
AV × EF
What is the primary purpose of performing vulnerability assessment?
To identify what needs protection, evaluate threats, appraise vulnerabilities, and assess potential damage
A standard in security policy refers to:
Requirements specific to a system or procedure
An Acceptable Use Policy primarily addresses
How employees utilize company resources
What does a vulnerability scanner typically NOT perform?
Suggest improvements to application logic
What does the baseline report in vulnerability assessment compare?
Current state of a system to its established standard
What is the risk calculation that involves subjective judgment?
Qualitative analysis
Which of the following agreements is used primarily to define service expectations between organizations?
SLA (Service Level Agreement)
Banner grabbing tools are primarily used to:
Identify system information from services
In risk management, what does mitigation mean?
Making a risk less serious
Which type of policy specifically deals with data storage and retention?
Data Policy
Continuous security monitoring is part of:
Risk assessment