Module 1
Module 3
Module 4
Module 9
Module 10
100

What layer of the OSI model is responsible for providing dialog control between devices?

The Session layer.

100

What algorithm is used to verify data integrity and authenticity through a fixed-size hash value?

SHA-256.

100

What software development methodology emphasizes iterative development and customer feedback?

Agile methodology.

100

Which sandboxing approach allows specific applications to operate under set rules that govern their execution?

Rule-based sandboxing.

100

What is the standard security technology for establishing an encrypted link between a web server and a browser?

SSL/TLS.

200

Which protocol operates at the Transport layer to ensure complete data transfer?

Transmission Control Protocol (TCP).

200

Which asymmetric encryption algorithm is commonly used for secure data exchange?

RSA (Rivest-Shamir-Adleman).

200

Which tool is widely used for continuous integration and continuous deployment in software development?

Jenkins

200

What is the main purpose of applying patches in the context of application patch management?

To fix vulnerabilities and protect against exploits.

200

Which security measure is critical for protecting data at rest on any device or network?

Encryption.

300

In network topology, what term describes a network layout where each node is connected to a central hub?

Star topology.

300

What is the process called that ensures both confidentiality and integrity of transmitted data?

Encryption and hashing.

300

What type of testing focuses on a unit or small component of the software to verify its functionality?

Unit testing.

300

What type of software is critical for managing the deployment of updates to secure networked applications?

Patch management software.

300

What type of cyber attack involves encrypting the victim's data and demanding payment for the decryption key?

Ransomware.

400

What device operates at the Network layer to direct data packets between different networks?

Router.

400

In digital signatures, what type of cryptography is utilized to validate the authenticity and integrity of a message?

Public key cryptography.

400

In Agile project management, what term describes a time-boxed period during which specific work has to be completed?

Sprint.

400

Which approach to sandboxing completely isolates a program from the main operating system?

Isolation-based sandboxing.

400

Which process is used to monitor the activities on network devices to detect and respond to unauthorized attempts?

Intrusion detection system (IDS).

500

Which application layer protocol is used for securely transferring files over a network?

Secure File Transfer Protocol (SFTP).

500

What protocol provides a secure method of exchanging cryptographic keys over a public channel?

Diffie-Hellman key exchange.

500

What is the practice called that involves the regular merging of code changes into a central repository to prevent integration problems?

Continuous integration.

500

How do unpatched vulnerabilities pose a risk to organizational security according to Module 9?

They allow attackers to exploit these vulnerabilities to conduct cyber attacks.

500

What strategy involves simulating cyber attacks to identify vulnerabilities in a system?

Penetration testing.