What is the principle of 'least privilege' and how does it apply to secure coding?
- Giving full access to all users
- Granting the minimum level of access to perform tasks
- Randomly assigning access levels
- Restricting access based on user popularity
The principle of 'least privilege' involves granting users or systems the minimum level of access needed to perform their tasks. In secure coding, applying this principle helps minimize potential damage from accidental or intentional misuse of privileges. By limiting access rights, the attack surface is reduced, enhancing overall system security. Understanding and implementing this principle is crucial for developing secure code.__________________________________________________
Which type of cyber attack involves sending fraudulent emails resembling those from reputable sources?
- Cross-Site Scripting (XSS)
- Injection attacks
- Phishing
- Spoofing
Phishing is a cyber attack that involves sending fraudulent emails, often mimicking reputable sources, to trick individuals into revealing sensitive information. It is a form of social engineering aimed at exploiting human trust. Recognizing phishing techniques is essential for users to avoid falling victim to such deceptive tactics and to enhance overall cybersecurity awareness.__________________________________________________
The ____________ is a protocol often used to securely manage and monitor IoT devices remotely.
- CoAP (Constrained Application Protocol)
- HTTP (Hypertext Transfer Protocol)
- MQTT (Message Queuing Telemetry Transport)
- SNMP (Simple Network Management Protocol)
SNMP (Simple Network Management Protocol) is commonly used to securely manage and monitor IoT devices remotely. It provides a standardized framework for communication and management tasks, allowing administrators to monitor device performance and configure settings. Familiarity with SNMP is essential for effective IoT device management and ensuring the security of remote monitoring processes.__________________________________________________
What is a common vulnerability associated with older Bluetooth connections?
- Blueborne Vulnerability
- Bluebugging
- Bluejacking
- Bluesnarfing
Bluesnarfing is a common vulnerability associated with older Bluetooth connections. It allows unauthorized access to a device's data, such as contacts and messages. Recognizing this vulnerability is crucial for securing Bluetooth-enabled devices and implementing measures to prevent unauthorized data access through Bluetooth attacks.__________________________________________________
____________ are detailed instructions or guidelines that support the security policy by outlining how to implement policies.
- Administrative Directives
- Operational Protocols
- Procedural Guidelines
- Security Procedures
Security Procedures are detailed instructions or guidelines that support the security policy by outlining how to implement policies. They provide step-by-step instructions for various security-related processes and actions, ensuring consistent and effective policy enforcement. Familiarity with security procedures is essential for implementing and maintaining a robust security infrastructure within an organization.__________________________________________________
How does a 'Hot Site' differ from a 'Cold Site' in disaster recovery terms?
- Cold Site has no computer systems or infrastructure
- Cold Site is a data center with active servers
- Hot Site is a secure offsite location for document storage
- Hot Site is fully equipped and operational
In disaster recovery terms, a Hot Site is fully equipped and operational, ready to take over functions in case of a disaster. On the other hand, a Cold Site lacks computer systems and infrastructure. It serves as a space to restore operations, requiring time to set up. Understanding the distinction between Hot and Cold Sites is crucial for designing an effective disaster recovery strategy based on the specific needs of the organization.__________________________________________________
Which aspect is most crucial when evaluating a vendor's security posture?
- Access Controls
- Incident Response Capability
- Marketing Strategies
- User Interface Design
When evaluating a vendor's security posture, incident response capability is the most crucial aspect. The ability to effectively respond to security incidents is vital for minimizing potential damage and ensuring a swift recovery. While access controls are essential for prevention, incident response capability focuses on handling security events, making it a key factor in determining the overall security readiness of a vendor.__________________________________________________
How does a 'Stored XSS' attack differ from a 'Reflected XSS' attack?
- Reflected XSS injects scripts in databases
- Reflected XSS injects scripts in user input
- Stored XSS injects malicious scripts that persist on the server
- Stored XSS injects scripts in HTTP responses
In a 'Stored XSS' attack, malicious scripts are injected into a server, persisting and potentially affecting multiple users. On the other hand, 'Reflected XSS' injects scripts in user input, reflecting the attack back to the user. Understanding the distinctions is crucial for implementing defenses against both types of attacks, ensuring web application security.__________________________________________________
After a major data breach, a company found that the breach was due to an employee falling for a phishing email. This incident highlights the importance of ____________ in cybersecurity.
- Endpoint Security
- Intrusion Detection System (IDS)
- Multi-Factor Authentication (MFA)
- Security Awareness Training
This scenario underscores the critical importance of security awareness training. Educating employees about phishing threats and promoting a culture of cybersecurity awareness can help prevent incidents like data breaches caused by human error. Security awareness training is a proactive measure that equips employees with the knowledge and skills to recognize and avoid social engineering attacks, contributing to overall organizational resilience against cyber threats.__________________________________________________
In BCM, the ____________ is a comprehensive document that provides a roadmap for how to continue operations under adverse conditions.
- Business Continuity Plan (BCP)
- Crisis Communication Plan
- Emergency Response Plan
- Incident Recovery Plan
The Business Continuity Plan (BCP) in BCM is a comprehensive document outlining strategies and procedures for continuing operations during adverse conditions. It serves as a roadmap, detailing roles, responsibilities, and steps to be taken to minimize disruption and ensure business resilience in the face of unexpected events. Understanding BCP is crucial for effective BCM.__________________________________________________