The _______ is a standard protocol for securely accessing and managing remote devices.
- FTP (File Transfer Protocol)
- IP (Internet Protocol)
- SSH (Secure Shell)
- TCP (Transmission Control Protocol)
The SSH (Secure Shell) protocol is a standard for securely accessing and managing remote devices. It provides secure remote access, file transfers, and network services, using strong encryption and authentication methods to protect communication.
What primary purpose does a firewall serve in a network?
- Distribute IP addresses
- Filter and control network traffic
- Physically connect devices
- Provide network speed optimization
A firewall primarily serves to filter and control network traffic, allowing or denying packets based on specified criteria, enhancing network security.
What is the primary purpose of a Web Application Firewall (WAF)?
- To block malicious web traffic
- To design web interfaces
- To manage web application sessions
- To speed up web application loading
A Web Application Firewall (WAF) primarily serves to block malicious web traffic and protect web applications from various cyber threats and attacks.
During a penetration test, a tester was able to access a company's internal network by mimicking an employee's behavior and tailgating into a secure area. This tester exploited a weakness in what area of security?
- Access Control Systems
- Network Security
- Physical Security
- Social Engineering
The tester exploited a weakness in Social Engineering, as they used tactics to manipulate people into allowing unauthorized physical access.
Which term describes the act of intentionally finding and exploiting vulnerabilities in a system, but with the goal of improving its security?
- Cracking
- Cybercrime Prevention
- Hacking
- Penetration Testing
Penetration Testing is the process of intentionally finding and exploiting vulnerabilities in a system with the goal of improving its security. Unlike malicious hacking or cracking, penetration testing is done with the organization's consent to identify and rectify vulnerabilities before potential attackers can exploit them.
Advanced Persistent Threats (APTs) typically involve long-term attacks that focus on _______ rather than immediate harm.
- DDoS Attacks
- Data Exfiltration
- Exploiting Vulnerabilities
- Phishing Campaigns
APTs aim at "Data Exfiltration," which involves stealing data over an extended period, focusing on long-term gains, not causing immediate harm.
IPsec is a suite of protocols designed to secure what type of communication?
- Internet browsing
- Network
- Wireless connections
IPsec (Internet Protocol Security) is designed to secure network communication, ensuring data integrity and confidentiality. It's often used to create VPNs for secure network connections.
DLP solutions often use _______ to detect sensitive data based on predefined criteria.
- Biometrics
- Encryption
- Firewalls
- Machine Learning
Data Loss Prevention (DLP) solutions often employ Machine Learning algorithms to identify and classify sensitive data. These algorithms learn from historical data and predefined criteria to recognize patterns associated with sensitive information, helping prevent data leaks and breaches.
Which tool is commonly used to scan a computer system for known malware signatures?
- Antivirus
- Browser
- Firewall
- VPN
Antivirus software is commonly used to scan a computer system for known malware signatures. It compares files and activities on the computer to a database of known malware signatures to detect and remove malicious software.
In the context of firewalls, what does the term "stateful inspection" refer to?
- A method for tracking network packets
- A process for encrypting data transmissions
- A technique for blocking network traffic
- A way to filter website content
"Stateful inspection" in firewalls refers to the method of tracking the state of active connections and making decisions based on the context of the traffic, enhancing security by understanding the state of network connections.