This feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action.
a. Confidentiality
b. Nonrepudiation
c. Obfuscation
d. Authentication
What is nonrepudiation?
This is a standard format for digital certificates.
a. JPG
b. .cer
c. MPEG-4 Part 14
d. X.509
What is d. X.509
This is a layer 2 attack.
a. DNS poisoning
b.DNS hijacking
c. ARP poisoning
d. DDoS
What is c. ARP poisoning
The best description of a mantrap.
a. A mantrap separates threat actors from defenders.
b. A mantrap cools a server room by trapping body heat.
c. A mantrap is a small space with two separate sets of interlocking doors.
d. A mantrap is a challenge given to cybersecurity experts.
What is c. A mantrap is a small space with two separate sets of interlocking doors.
This attack sees an attacker attempt to determine the hash function's input strings that produce the same hash result.
a. Known ciphertext attack
b. Downgrade attack
c. Collision attack
d. Birthday attack
What is c. Collision attack
This encryption method will provide the highest security against attacks.
a. AES
b. RC4
c. Blowfish
d. 3DES
What is AES encryption?
This is a process where a key is divided into a specific number of parts and distributed to multiple people, with some of them having the same parts of the key.
a. Renewal
b. Revocation
c. M-of-N control
d. Key escrow
What is c. M-of-N control.
This tool will allow you to change the permissions of a file on a Linux system so that the file can only be accessed by its owner.
a. chmod
b. grep
c. Nessuss
d. Cuckoo
What is a. chmod?
Outlining the process of a proxy server.
a. User - internet - reverse proxy - forward proxy - user
b. User - forward proxy - Internet - reverse proxy - server
c. User - reverse proxy - Internet - forward proxy - server
d. User - forward proxy - user - reverse proxy - Internet
What is b. User - forward proxy - Internet - reverse proxy - server
This sensor is best suited for fire detection?
a. Proximity sensor
b. Temperature detection sensor
c. Motion detection sensor
d. Noise detection sensor
What is b. Temperature detection sensor
In this cipher, the entire alphabet is rotated (as in, A=N, B=O), making it difficult to identify.
a. 3DES
b. ROT13
c. XOR
d. AES
What is, b. ROT13
Alliance Consulting, a company based in France, is shutting down. Louis, the owner of the company, applied to revoke his digital certificate. He is very busy with the other details of shutting the company down and needs to be able to check the certificate's status quickly and easily. This will help him get a real-time lookup of the certificate's status.
a. CRL
b. OCSP
c. CSR
d. EV
What is b. OCSP
Essentially, a man-in-the-middle (MITM) attack versus a man-in-the-browser (MITB) attack.
a. A MITM attack occurs between two endpoints, whereas a MITB attack occurs between a browser and web server.
b. A MITM attack occurs between two endpoints, whereas a MITB attack occurs between a browser and underlying computer.
c. A MITM attack can modify the intercepted packet, whereas a MITB attack can only analyze it.
d. A MITM attack can only analyze the intercepted packet, whereas a MITB attack can modify the intercepted packet.
What is b. A MITM attack occurs between two endpoints, whereas a MITB attack occurs between a browser and underlying computer.
This monitoring methodology will trigger the IDS if any application tries to scan multiple ports.
a. Signature-based monitoring
b. Heuristic monitoring
c. Anomaly-based monitoring
d. Behavior-based monitoring
What is b. Heuristic monitoring
A company has multiple CAs and intermediate CAs issuing digital certificates in different departments, with no one cross-checking their work, for instance, in this trust model.
a. Hierarchical trust model
b. Bridge trust model
c. Web of trust model
d. Distributed trust model
What is d. Distributed trust model
This algorithm encrypts and decrypts data using the same key.
What is the Symmetric cryptographic algorithm.
John had to send certain confidential data and messages to Sarah online. The use of this will ensure that the message's sender is, in fact, John.
What is a digital certificate?
For instance, David sent a message to Tina saying, "There is no school today!" For some reason, the message showed up on Tina's device as, "Come to the school ASAP!"
What is a MITM attack?
The best description of a host-based firewall.
What is A host-based firewall is a software firewall that protects a single endpoint device.
This protocol is used to prevent looping in a switch.
What is STP?
This process is used along with asymmetric cryptography to verify that a received encrypted document is real, from the original sender, and unaltered?
What is the Digital signature algorithm?
Sarah needs to send an email with important documents to her client. This protocol ensures that the email is secure.
What is S/MIME?
This type of attack occurs when a threat actor redirects network traffic by modifying the local host file to send legitimate traffic anywhere they choose.
What is DNS poisoning?
This type of intrusion detection system can also block attacks.
What is Inline?
When you are a security expert asked to protect the webservers hosted in your building from exposure to anyone other than server admins, this is the physical security method you should implement.
What is a Faraday cage?