When an attacker introduces malicious code into a software system, causing it to behave in unintended ways, this is known as what?
- Code Injection
- Exploiting a Vulnerability
- Malware Injection
- Software Compromise
Code Injection occurs when an attacker inserts malicious code into a software system, leading to unintended and potentially harmful behavior.
What would be the primary objective of a whaling attack?
- Extract personal information from random individuals
- Gain access to sensitive company data
- Impersonate a specific individual
- Target a large number of individuals
The primary objective of a whaling attack is to impersonate a specific individual, usually a high-ranking executive or influential person within an organization. Attackers aim to deceive others into believing they are this individual to gain access to sensitive information or resources.
An employee using their access to steal confidential company data for personal gain is an example of which type of insider threat?
- Espionage
- Fraud
- Negligence
- Sabotage
This is an example of the "Fraud" type of insider threat. Fraud involves malicious activities by insiders, typically for personal gain. In this case, the employee is using their access to commit an act of fraud by stealing confidential data for their benefit.
In a VPN, what is the role of a "tunneling protocol"?
- It encrypts data in transit
- It establishes connections
- It manages user authentication
- It routes traffic to external servers
A "tunneling protocol" plays a crucial role in VPNs by encapsulating data in a secure "tunnel," encrypting it, and ensuring safe transit through untrusted networks.
In file system security, what restricts or allows specific actions (like reading, writing, executing) on a file or a directory?
- ACL
- BIOS
- Firewall
- SMTP
Access Control Lists (ACLs) are used to restrict or allow specific actions on files or directories. They define who can access the file or directory, what actions they can perform (e.g., read, write, execute), and under what conditions they can do so.
The process of converting data into a code to prevent unauthorized access is known as _______.
- Authentication
- Encryption
- Firewall
- Hacking
Encryption is the process of converting data into a code to prevent unauthorized access. It ensures that even if unauthorized users gain access to the data, they cannot read or use it without the decryption key. Encryption is crucial for data security and privacy.
In which type of attack does an attacker trick a victim into submitting a malicious request on their behalf?
- Cross-Site Request Forgery (CSRF)
- Cross-Site Scripting (XSS)
- Distributed Denial of Service (DDoS)
- Man-in-the-Middle (MitM)
Cross-Site Request Forgery (CSRF) is an attack in which the attacker tricks a victim into submitting a malicious request, often without the victim's knowledge, on their behalf.
An organization's proactive approach to anticipate and respond to future security incidents is termed as _______ management.
- Incident
- Risk
- Security
- Vulnerability
The correct answer is "Risk Management." It encompasses identifying potential security threats, assessing their impact, and implementing strategies to mitigate them.
To ensure that the browser enforces the CSP but does not block or report any content, the _______ directive is used.
- allow-all
- default-src
- enforce
- report-only
To ensure that the browser enforces the Content Security Policy (CSP) but only reports violations without blocking content, the report-only directive is used. This is useful for monitoring policy violations without impacting user experience.
Which of the following best describes a "zero-day" vulnerability?
- A vulnerability known for zero days
- A vulnerability that's been exploited zero times
- A vulnerability that's undisclosed to the vendor
- A vulnerability with no known exploits
A "zero-day" vulnerability is one that's undisclosed to the software or hardware vendor, meaning there are no patches or fixes available. It's called "zero-day" because it's effectively day zero of the vendor's awareness.
A process in which an operating system ensures that an application only accesses the resources necessary for its legitimate purpose is called what?
- Clustering
- Multithreading
- Sandboxing
- Virtualization
The process in which an operating system ensures that an application only accesses the resources necessary for its legitimate purpose is called "Sandboxing." Sandboxing is a security mechanism that isolates applications, preventing them from making unauthorized changes to a system or accessing resources they shouldn't. It enhances security by containing potentially harmful processes.
What mechanism does IPsec use to ensure data integrity and confidentiality at the same time?
- AH (Authentication Header)
- ESP (Encapsulating Security Payload)
- PPTP (Point-to-Point Tunneling Protocol)
- SSL (Secure Sockets Layer)
IPsec uses ESP, the Encapsulating Security Payload, to provide both data integrity and confidentiality. ESP encapsulates the original packet and adds encryption and integrity checks.