What layer of the OSI model is responsible for providing dialog control between devices?
The Session layer.
What algorithm is used to verify data integrity and authenticity through a fixed-size hash value?
SHA-256.
What software development methodology emphasizes iterative development and customer feedback?
Agile methodology.
Which sandboxing approach allows specific applications to operate under set rules that govern their execution?
Rule-based sandboxing.
What is the standard security technology for establishing an encrypted link between a web server and a browser?
SSL/TLS.
Which protocol operates at the Transport layer to ensure complete data transfer?
Transmission Control Protocol (TCP).
Which asymmetric encryption algorithm is commonly used for secure data exchange?
RSA (Rivest-Shamir-Adleman).
Which tool is widely used for continuous integration and continuous deployment in software development?
Jenkins
What is the main purpose of applying patches in the context of application patch management?
To fix vulnerabilities and protect against exploits.
Which security measure is critical for protecting data at rest on any device or network?
Encryption.
In network topology, what term describes a network layout where each node is connected to a central hub?
Star topology.
What is the process called that ensures both confidentiality and integrity of transmitted data?
Encryption and hashing.
What type of testing focuses on a unit or small component of the software to verify its functionality?
Unit testing.
What type of software is critical for managing the deployment of updates to secure networked applications?
Patch management software.
What type of cyber attack involves encrypting the victim's data and demanding payment for the decryption key?
Ransomware.
What device operates at the Network layer to direct data packets between different networks?
Router.
In digital signatures, what type of cryptography is utilized to validate the authenticity and integrity of a message?
Public key cryptography.
In Agile project management, what term describes a time-boxed period during which specific work has to be completed?
Sprint.
Which approach to sandboxing completely isolates a program from the main operating system?
Isolation-based sandboxing.
Which process is used to monitor the activities on network devices to detect and respond to unauthorized attempts?
Intrusion detection system (IDS).
Which application layer protocol is used for securely transferring files over a network?
Secure File Transfer Protocol (SFTP).
What protocol provides a secure method of exchanging cryptographic keys over a public channel?
Diffie-Hellman key exchange.
What is the practice called that involves the regular merging of code changes into a central repository to prevent integration problems?
Continuous integration.
How do unpatched vulnerabilities pose a risk to organizational security according to Module 9?
They allow attackers to exploit these vulnerabilities to conduct cyber attacks.
What strategy involves simulating cyber attacks to identify vulnerabilities in a system?
Penetration testing.