What is the primary purpose of a firewall?
Block unauthorized access to or from a network
What is the purpose of a security policy in an organization?
To enforce standard practices and define acceptable behavior
Which of the following is an example of social engineering?
Phishing email asking for login credentials
This type of encryption uses the same key for both encryption and decryption.
Symmetric Encryption
What does the term “least privilege” mean in access control?
Users should have only the minimum access necessary
A mathematical function that converts input data into a fixed-size string, often used for integrity checking.
Hash Function
What kind of attack intercepts and possibly alters communication between two parties?
Man-in-the-Middle (MITM)
A public-key algorithm that relies on the difficulty of factoring large prime numbers.
RSA (Rivest-Shamir-Adleman)
What does 2FA (Two-Factor Authentication) provide?
It adds a second layer of verification to user login
The process of converting readable data into an unreadable format to prevent unauthorized access.
Encryption