What encryption technique involves two interdependent cryptographic keys, one public and one private?
- AES
- DES
- RSA
- SSL
RSA (Rivest-Shamir-Adleman) is an encryption technique that uses two interdependent cryptographic keys, a public key for encryption and a private key for decryption. This method ensures secure communication and data protection.
An organization's IT department wants to enforce a policy where all software installations and updates can only be performed by administrators. This is an example of which type of security policy mechanism?
- Administrative Access Control
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Role-Based Access Control (RBAC)
This policy is an example of Role-Based Access Control (RBAC). RBAC is a security mechanism that restricts system access to authorized users or processes based on their roles and responsibilities within the organization. It is commonly used to delegate software installations and updates to administrators.
What type of assessment is primarily focused on ensuring that a company is adhering to its stated security policies and controls?
- Compliance Assessment
- Penetration Testing
- Risk Assessment
- Vulnerability Assessment
A 'Compliance Assessment' primarily aims to ensure that a company is adhering to its established security policies and controls. This assessment checks if the organization follows the security standards it has set for itself.
Which phase of incident response involves determining the scope, size, and origin of an incident?
- Containment
- Detection
- Identification
- Recovery
The Identification phase in incident response involves understanding the incident's scope, size, and origin. This is crucial for formulating an effective response strategy.
An IT security analyst at a company identifies that a number of workstations have become part of a botnet. Which type of malware is most likely responsible for this?
- Ransomware
- Spyware
- Trojan
- Worm
A botnet is typically composed of a network of infected computers or "zombies," and it's often orchestrated by a worm. Worms can autonomously replicate and spread across a network, making them a common choice for botnet creators.
How does a CSP help in mitigating cross-site scripting (XSS) attacks?
- By controlling user access permissions
- By encrypting all data in transit
- By monitoring server logs
- By specifying which domains can load resources
A Content Security Policy (CSP) helps mitigate XSS attacks by specifying which domains can load resources on a web page. It provides a whitelist of approved sources for content, helping to prevent malicious scripts from executing from unauthorized sources, thereby enhancing security.
Which of the following is NOT a primary objective of security awareness training?
- Educating employees on security policies
- Fostering a security-conscious culture
- Protecting against all possible threats
- Reducing security risks
The primary objective of security awareness training is not to protect against all possible threats. It is more about educating employees on security policies, reducing security risks, and fostering a security-conscious culture within the organization. It's important to understand that while training is crucial, no training can guarantee protection against all threats.
In the context of BYOD policies, what refers to the isolation of personal and work data on a single device?
- Containerization
- Integration
- Segmentation
- Virtualization
Containerization, in the context of BYOD (Bring Your Own Device) policies, refers to the practice of isolating personal and work-related data on a single device within separate, secure containers. These containers keep the data separate, ensuring privacy and security for both personal and work-related information.
What is the primary benefit of a centralized patch management system for an organization?
- Improved Security
- Increased Bandwidth
- Faster Internet Speed
- Enhanced User Experience
A centralized patch management system (option 1) primarily benefits an organization by improving security. It allows the organization to efficiently and consistently apply software updates, patches, and fixes to all systems, reducing vulnerabilities and enhancing protection against cyber threats.
Under HIPAA, 'covered entities' include health care providers, health plans, and _______.
- Business Associates
- Government Agencies
- Insurance Companies
- Pharmaceutical Manufacturers
Under HIPAA (Health Insurance Portability and Accountability Act), 'covered entities' include health care providers, health plans, and Business Associates. Business Associates are individuals or entities that perform functions or activities that involve the use or disclosure of protected health information on behalf of covered entities.