In a PKI (Public Key Infrastructure) system, the private key is used to _______ a message, while the public key is used to _______ it.

  • Encode, Decode
  • Encrypt, Decrypt
  • Hash, Validate
  • Sign, Verify
In a PKI system, the private key is used to sign a message, providing proof of the sender's identity and ensuring data integrity. The public key is used to verify the signature, allowing recipients to confirm the sender's identity and data authenticity.

Which method is commonly used by organizations to test the effectiveness of their security awareness training?

  • Firewall configurations
  • Phishing simulations
  • Social engineering
  • Virtual private networks (VPNs)
Phishing simulations are commonly used by organizations to test the effectiveness of their security awareness training. They simulate phishing attacks to see how well employees can recognize and respond to phishing attempts.

What is the primary purpose of an incident reporting procedure in an organization?

  • To assign blame
  • To improve system performance
  • To prevent all incidents
  • To identify and address security incidents
The primary purpose of an incident reporting procedure in an organization is to identify and address security incidents. This process is essential for recognizing and responding to events that could potentially harm the organization's information security. Incident reporting helps in containment and recovery, minimizing the impact of security breaches.

In many operating systems, the _______ acts as a central policy that defines security-related computer settings.

  • Antivirus
  • Firewall
  • Operating System
  • Router
In many operating systems, the Operating System acts as a central policy that defines security-related computer settings. This includes user access controls, permissions, and various security configurations.

Jane, an IT manager, receives an email detailing a potential security incident. However, the email does not contain enough specifics to act upon. To improve the quality and consistency of incident reports, Jane might consider implementing what?

  • Incident Response Plan
  • Regular Software Updates
  • Security Awareness Training
  • Security Incident Reporting Guidelines
Jane should consider implementing Security Incident Reporting Guidelines. These guidelines provide a structured format for reporting security incidents, including the specific details and information required. They help ensure that incident reports contain enough information for the IT team to act upon effectively.

The practice of deliberately leaving vulnerabilities open in a system as a trap to detect and monitor intruders is termed as what?

  • Ethical Hacking
  • Honeypot
  • Penetration Testing
  • Zero-Day Exploitation
A "Honeypot" is a cybersecurity mechanism that intentionally exposes vulnerabilities to lure and monitor potential intruders and threats.

Charlie is developing a web application. He ensures that every form input is validated and sanitized before it's processed. Despite this, an attacker is able to inject a script that steals user session cookies. Which vulnerability in the application did the attacker most likely exploit?

  • Cross-Site Request Forgery (CSRF)
  • Cross-Site Scripting (XSS)
  • Insecure Deserialization
  • SQL Injection
The attacker likely exploited a Cross-Site Scripting (XSS) vulnerability, allowing them to inject malicious scripts into the web application despite input validation and sanitization.

Which of the following is a benefit of encrypting an individual file rather than an entire disk?

  • Complete security
  • Enhanced performance
  • Selective protection
  • Simplified management
Encrypting an individual file offers the benefit of selective protection. It allows you to choose specific files or folders to encrypt, offering security where it's needed most without affecting the performance or management of the entire disk. This is especially useful when you only need to protect certain sensitive files rather than an entire disk.

In an incident reporting procedure, a _______ is typically designated to coordinate the response and recovery efforts.

  • CEO
  • CISO
  • CSIRT
  • CTO
In an incident reporting procedure, a CSIRT (Computer Security Incident Response Team) is typically designated to coordinate the response and recovery efforts. A CSIRT is a team of experts responsible for the protection against and management of cybersecurity incidents.

A company hired an ethical hacker to assess its security posture. After the assessment, the hacker provided a detailed report showing several vulnerabilities but did not exploit any. Which type of test did the hacker most likely perform?

  • Penetration Test
  • Red Team Exercise
  • Security Audit
  • Vulnerability Assessment
The hacker likely performed a Vulnerability Assessment, which identifies vulnerabilities without exploiting them. A Penetration Test would involve exploiting vulnerabilities.

Which of the following is a primary goal of operating system hardening?

  • Enhancing security by reducing vulnerabilities
  • Expanding network connectivity
  • Increasing system performance
  • Simplifying user interfaces
The primary goal of operating system hardening is to enhance security by reducing vulnerabilities. This involves configuring the OS to minimize potential attack vectors and make it more resistant to security threats and exploits.

To prevent unauthorized access to a wireless network, administrators can implement MAC address _______.

  • Broadcasting
  • Encryption
  • Filtering
  • Hiding
MAC address filtering allows or denies access to a network based on the unique hardware address of a device, enhancing security by controlling device access.