A _______ is a piece of code that attaches itself to a legitimate program and propagates to other programs and systems.

  • Firewall
  • Router
  • Switch
  • Worm
A worm is a self-replicating piece of malicious code that can attach itself to legitimate programs and propagate to other systems without any user intervention. Unlike viruses, worms do not require a host program to attach to.

Zero-day exploits target vulnerabilities that are known to the software vendor but:

  • The vendor can't reproduce the issue
  • The vendor has not yet released a patch
  • The vendor is actively working on a fix
  • The vendor refuses to acknowledge the vulnerability
Zero-day exploits target vulnerabilities that are known to the software vendor but do not yet have an official patch or fix available. Hackers exploit these vulnerabilities before the vendor can respond with a patch, potentially causing significant damage or security breaches.

After a ransomware attack, a company realizes they have lost access to their critical data. Fortunately, they have a recent backup stored in a remote location. This situation highlights the importance of which data protection principle?

  • Authentication
  • Availability
  • Confidentiality
  • Integrity
This situation highlights the importance of data availability. Data protection principles ensure the confidentiality, integrity, and availability of data. In this case, the company's ability to access the backup data stored in a remote location demonstrates the principle of data availability.

Which encryption protocol is commonly used by modern VPNs to secure data?

  • ARP (Address Resolution Protocol)
  • DHCP (Dynamic Host Configuration Protocol)
  • HTTP (Hypertext Transfer Protocol)
  • TLS (Transport Layer Security)
Modern VPNs commonly use TLS (Transport Layer Security) for data encryption. TLS ensures data confidentiality and integrity when transmitted over the internet.

Which type of attack targets vulnerabilities in a website's database by inserting malicious SQL code?

  • Cross-Site Scripting
  • Denial of Service Attack
  • Phishing Attack
  • SQL Injection
SQL Injection is an attack where an attacker inserts malicious SQL code into input fields to manipulate or extract data from a database.

Spear phishing and vishing are both techniques used in what kind of cyber attack?

  • DDoS Attack
  • Malware Attack
  • Man-in-the-Middle Attack
  • Social Engineering
Spear phishing and vishing are both types of social engineering attacks. Social engineering is a category of cyberattacks that manipulate individuals into revealing confidential information, typically through deceptive or manipulative means. Spear phishing targets specific individuals, while vishing involves voice communication.

A cryptographic method that requires two paired keys – one private and one public – is known as _______.

  • Asymmetric Key
  • Encryption
  • Hashing
  • Symmetric Key
An Asymmetric Key (or Public Key) cryptographic method uses two keys, one public and one private, for secure communication. Data encrypted with one key can only be decrypted with the other, providing a high level of security.

Which regulation primarily deals with the protection of patient health information in the U.S.?

  • FERPA
  • HIPAA
  • OSHA
  • SOX
HIPAA, or the Health Insurance Portability and Accountability Act, is the regulation primarily concerned with protecting patient health information in the United States. It sets standards for healthcare data security and privacy.

To ensure the authenticity and integrity of data, digital signatures use cryptographic _______.

  • Algorithms
  • Hashes
  • Keys
  • Protocols
To ensure the authenticity and integrity of data, digital signatures use cryptographic hashes. Hash functions generate unique fixed-size values (hashes) based on the content of the data being signed, making it practically impossible for someone to alter the data without detection.

In advanced firewalls, what capability allows the inspection of encrypted SSL/TLS traffic?

  • Deep Packet Inspection (DPI)
  • Intrusion Prevention System (IPS)
  • Port-based Filtering
  • Stateful Packet Inspection (SPI)
Deep Packet Inspection (DPI) enables the inspection of the actual content within encrypted SSL/TLS traffic, making it capable of identifying malicious content or patterns. This is a critical feature for advanced firewall security.