_______ is a type of malware that encrypts the user's files and demands payment in exchange for the decryption key.

  • Adware
  • Ransomware
  • Trojan
  • Worm
Ransomware is a type of malware that encrypts the user's files and demands payment in exchange for the decryption key. It is a significant threat to data security and has been responsible for many high-profile cyberattacks.

In public-key cryptography, the decryption key is kept private and is known as the _______ key.

  • Cipher
  • Private
  • Public
  • Secret
In public-key cryptography, the decryption key is kept private, known as the "Private Key." This key is kept secret by the owner and is used to decrypt data that has been encrypted with the corresponding public key.

In the context of threat intelligence, what refers to a set of indicators related to a specific cybersecurity threat?

  • Threat Assessment
  • Threat Intelligence Report
  • Threat Landscape
  • Threat Signature
A "Threat Signature" is a set of indicators that characterize a specific cybersecurity threat, helping in its identification and mitigation.

A _______ VPN provides a secure connection between multiple networks over the internet.

  • Endpoint-to-Endpoint
  • PPTP
  • SSL
  • Site-to-Site
A Site-to-Site VPN connects entire networks securely over the internet. It's commonly used to connect remote offices or cloud services to the main network.

In the context of social engineering, what does "baiting" usually involve?

  • Hiding behind a mask
  • Impersonating someone
  • Offering something enticing to the victim
  • Threatening the victim
Baiting in social engineering involves offering something enticing to the victim. This could be in the form of a free download, a prize, or anything that would make the victim want to take an action that benefits the attacker.

Which secure coding principle emphasizes the importance of denying everything by default and only granting permissions intentionally?

  • Defense in Depth
  • Fail-Safe Defaults
  • Principle of Least Privilege
  • Security through Obscurity
The Principle of Least Privilege advocates limiting permissions to the minimum necessary, ensuring that by default, access is denied, and permissions are granted intentionally.

An encryption system that uses the same key to encrypt and decrypt information is known as _______ encryption.

  • Asymmetric
  • Private
  • Public
  • Symmetric
Symmetric encryption, also known as private-key encryption, uses the same key for both encryption and decryption. This means that the sender and the recipient must both have access to the same secret key. It is typically faster and less computationally intensive compared to asymmetric encryption.

How does a CSP help in mitigating cross-site scripting (XSS) attacks?

  • By controlling user access permissions
  • By encrypting all data in transit
  • By monitoring server logs
  • By specifying which domains can load resources
A Content Security Policy (CSP) helps mitigate XSS attacks by specifying which domains can load resources on a web page. It provides a whitelist of approved sources for content, helping to prevent malicious scripts from executing from unauthorized sources, thereby enhancing security.

Which of the following is NOT a primary objective of security awareness training?

  • Educating employees on security policies
  • Fostering a security-conscious culture
  • Protecting against all possible threats
  • Reducing security risks
The primary objective of security awareness training is not to protect against all possible threats. It is more about educating employees on security policies, reducing security risks, and fostering a security-conscious culture within the organization. It's important to understand that while training is crucial, no training can guarantee protection against all threats.

In the context of BYOD policies, what refers to the isolation of personal and work data on a single device?

  • Containerization
  • Integration
  • Segmentation
  • Virtualization
Containerization, in the context of BYOD (Bring Your Own Device) policies, refers to the practice of isolating personal and work-related data on a single device within separate, secure containers. These containers keep the data separate, ensuring privacy and security for both personal and work-related information.