In advanced firewalls, what capability allows the inspection of encrypted SSL/TLS traffic?
- Deep Packet Inspection (DPI)
- Intrusion Prevention System (IPS)
- Port-based Filtering
- Stateful Packet Inspection (SPI)
Deep Packet Inspection (DPI) enables the inspection of the actual content within encrypted SSL/TLS traffic, making it capable of identifying malicious content or patterns. This is a critical feature for advanced firewall security.
To ensure the authenticity and integrity of data, digital signatures use cryptographic _______.
- Algorithms
- Hashes
- Keys
- Protocols
To ensure the authenticity and integrity of data, digital signatures use cryptographic hashes. Hash functions generate unique fixed-size values (hashes) based on the content of the data being signed, making it practically impossible for someone to alter the data without detection.
Which regulation primarily deals with the protection of patient health information in the U.S.?
- FERPA
- HIPAA
- OSHA
- SOX
HIPAA, or the Health Insurance Portability and Accountability Act, is the regulation primarily concerned with protecting patient health information in the United States. It sets standards for healthcare data security and privacy.
A cryptographic method that requires two paired keys – one private and one public – is known as _______.
- Asymmetric Key
- Encryption
- Hashing
- Symmetric Key
An Asymmetric Key (or Public Key) cryptographic method uses two keys, one public and one private, for secure communication. Data encrypted with one key can only be decrypted with the other, providing a high level of security.
Spear phishing and vishing are both techniques used in what kind of cyber attack?
- DDoS Attack
- Malware Attack
- Man-in-the-Middle Attack
- Social Engineering
Spear phishing and vishing are both types of social engineering attacks. Social engineering is a category of cyberattacks that manipulate individuals into revealing confidential information, typically through deceptive or manipulative means. Spear phishing targets specific individuals, while vishing involves voice communication.
Which type of attack targets vulnerabilities in a website's database by inserting malicious SQL code?
- Cross-Site Scripting
- Denial of Service Attack
- Phishing Attack
- SQL Injection
SQL Injection is an attack where an attacker inserts malicious SQL code into input fields to manipulate or extract data from a database.
Which encryption protocol is commonly used by modern VPNs to secure data?
- ARP (Address Resolution Protocol)
- DHCP (Dynamic Host Configuration Protocol)
- HTTP (Hypertext Transfer Protocol)
- TLS (Transport Layer Security)
Modern VPNs commonly use TLS (Transport Layer Security) for data encryption. TLS ensures data confidentiality and integrity when transmitted over the internet.
After a ransomware attack, a company realizes they have lost access to their critical data. Fortunately, they have a recent backup stored in a remote location. This situation highlights the importance of which data protection principle?
- Authentication
- Availability
- Confidentiality
- Integrity
This situation highlights the importance of data availability. Data protection principles ensure the confidentiality, integrity, and availability of data. In this case, the company's ability to access the backup data stored in a remote location demonstrates the principle of data availability.
Zero-day exploits target vulnerabilities that are known to the software vendor but:
- The vendor can't reproduce the issue
- The vendor has not yet released a patch
- The vendor is actively working on a fix
- The vendor refuses to acknowledge the vulnerability
Zero-day exploits target vulnerabilities that are known to the software vendor but do not yet have an official patch or fix available. Hackers exploit these vulnerabilities before the vendor can respond with a patch, potentially causing significant damage or security breaches.
A _______ is a piece of code that attaches itself to a legitimate program and propagates to other programs and systems.
- Firewall
- Router
- Switch
- Worm
A worm is a self-replicating piece of malicious code that can attach itself to legitimate programs and propagate to other systems without any user intervention. Unlike viruses, worms do not require a host program to attach to.
A hospital's electronic record system was breached, exposing patient records. The hospital is based in the United States. Which regulation mandates that the hospital notify affected patients of the breach?
- CCPA
- FERPA
- GDPR
- HIPAA
HIPAA (Health Insurance Portability and Accountability Act) is a U.S. federal law that mandates the protection of health information privacy and security. It requires healthcare organizations to notify affected patients in the event of a data breach involving their protected health information.
Which layer of the OSI model does SSL/TLS primarily operate at?
- Application
- Data Link Layer
- Physical Layer
- Transport Layer
SSL/TLS (Secure Sockets Layer/Transport Layer Security) primarily operates at the Application Layer (Layer 7) of the OSI model. It provides encryption and security for application-level data.