Which type of attack targets vulnerabilities in a website's database by inserting malicious SQL code?

  • Cross-Site Scripting
  • Denial of Service Attack
  • Phishing Attack
  • SQL Injection
SQL Injection is an attack where an attacker inserts malicious SQL code into input fields to manipulate or extract data from a database.

Spear phishing and vishing are both techniques used in what kind of cyber attack?

  • DDoS Attack
  • Malware Attack
  • Man-in-the-Middle Attack
  • Social Engineering
Spear phishing and vishing are both types of social engineering attacks. Social engineering is a category of cyberattacks that manipulate individuals into revealing confidential information, typically through deceptive or manipulative means. Spear phishing targets specific individuals, while vishing involves voice communication.

A cryptographic method that requires two paired keys – one private and one public – is known as _______.

  • Asymmetric Key
  • Encryption
  • Hashing
  • Symmetric Key
An Asymmetric Key (or Public Key) cryptographic method uses two keys, one public and one private, for secure communication. Data encrypted with one key can only be decrypted with the other, providing a high level of security.

Which regulation primarily deals with the protection of patient health information in the U.S.?

  • FERPA
  • HIPAA
  • OSHA
  • SOX
HIPAA, or the Health Insurance Portability and Accountability Act, is the regulation primarily concerned with protecting patient health information in the United States. It sets standards for healthcare data security and privacy.

To ensure the authenticity and integrity of data, digital signatures use cryptographic _______.

  • Algorithms
  • Hashes
  • Keys
  • Protocols
To ensure the authenticity and integrity of data, digital signatures use cryptographic hashes. Hash functions generate unique fixed-size values (hashes) based on the content of the data being signed, making it practically impossible for someone to alter the data without detection.

In advanced firewalls, what capability allows the inspection of encrypted SSL/TLS traffic?

  • Deep Packet Inspection (DPI)
  • Intrusion Prevention System (IPS)
  • Port-based Filtering
  • Stateful Packet Inspection (SPI)
Deep Packet Inspection (DPI) enables the inspection of the actual content within encrypted SSL/TLS traffic, making it capable of identifying malicious content or patterns. This is a critical feature for advanced firewall security.

Which protocol is specifically designed for securely transferring files over a network and is based on the SSH protocol?

  • FTP
  • HTTP
  • SFTP
  • SMTP
SFTP (SSH File Transfer Protocol) is a network protocol designed for securely transferring files over a network. It's based on the SSH (Secure Shell) protocol, which provides a secure way to access and manage remote servers and their files. SFTP encrypts data during transmission, enhancing security.

An organization's intrusion detection system (IDS) flags an executable file behaving suspiciously, trying to access system files and sending data to an external IP. However, the file's signature is not present in the malware database. This situation might be an instance of:

  • APT (Advanced Persistent Threat)
  • False Positive
  • Polymorphic Malware
  • Zero-Day Exploit
In this situation, where the behavior is suspicious, but the file's signature is not recognized, it could be indicative of a zero-day exploit, which is an attack that exploits a vulnerability unknown to the software vendor.

A _______ is a piece of code that attaches itself to a legitimate program and propagates to other programs and systems.

  • Firewall
  • Router
  • Switch
  • Worm
A worm is a self-replicating piece of malicious code that can attach itself to legitimate programs and propagate to other systems without any user intervention. Unlike viruses, worms do not require a host program to attach to.

Zero-day exploits target vulnerabilities that are known to the software vendor but:

  • The vendor can't reproduce the issue
  • The vendor has not yet released a patch
  • The vendor is actively working on a fix
  • The vendor refuses to acknowledge the vulnerability
Zero-day exploits target vulnerabilities that are known to the software vendor but do not yet have an official patch or fix available. Hackers exploit these vulnerabilities before the vendor can respond with a patch, potentially causing significant damage or security breaches.