Sarah, an IT administrator, notices that several unauthorized devices have been connecting to the company's wireless network. To ensure only company devices can connect, she considers implementing a security measure based on hardware addresses. Which security measure is she thinking of?
- MAC (Media Access Control) Filtering
- SSID Hiding
- WEP (Wired Equivalent Privacy)
- WPA3 (Wi-Fi Protected Access 3)
Sarah is considering implementing MAC (Media Access Control) filtering to control which devices can connect to the wireless network. It allows her to permit or deny devices based on their unique hardware addresses.
Which layer of the OSI model is primarily concerned with end-to-end communication and network security?
- Layer 2 - Data Link
- Layer 3 - Network
- Layer 5 - Session
- Layer 7 - Application
Layer 3, the Network layer, is primarily concerned with end-to-end communication, routing, and network security by controlling data packet routing.
An organization's new software automatically adjusts user permissions based on their job role and revokes access to certain files when an employee changes departments. This approach to managing user rights is an example of what?
- Attribute-Based Access Control (ABAC)
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Role-Based Access Control (RBAC)
This approach to managing user rights is an example of "Role-Based Access Control (RBAC)." RBAC assigns permissions based on a user's role or job function, simplifying permission management and reducing the risk of unauthorized access.
Policies that dictate the criteria for granting access to specific information or systems are called _______ policies.
- Access Control
- Authentication
- Authorization
- Encryption
"Authorization" policies specify who can access what in a system, setting the criteria for granting access to specific resources.
Regularly updating and patching network devices is a key _______ in network security.
- Password
- Principle
- Protocol
- Vulnerability
One of the key principles in network security is regularly updating and patching network devices to fix vulnerabilities and security issues.
To prevent unauthorized access to a wireless network, administrators can implement MAC address _______.
- Broadcasting
- Encryption
- Filtering
- Hiding
MAC address filtering allows or denies access to a network based on the unique hardware address of a device, enhancing security by controlling device access.
A financial institution wants to ensure that even if their data is intercepted during transmission, the intruder wouldn't be able to understand it. They decide to transform this data into a code to prevent unauthorized access. What process are they using?
- Compression
- Decryption
- Encryption
- Hashing
The financial institution is using encryption. Encryption is the process of transforming data into a code to prevent unauthorized access during transmission. It ensures that even if data is intercepted, it remains unintelligible to unauthorized individuals or intruders.
A cryptographic method that requires two paired keys – one private and one public – is known as _______.
- Asymmetric Key
- Encryption
- Hashing
- Symmetric Key
An Asymmetric Key (or Public Key) cryptographic method uses two keys, one public and one private, for secure communication. Data encrypted with one key can only be decrypted with the other, providing a high level of security.
Which regulation primarily deals with the protection of patient health information in the U.S.?
- FERPA
- HIPAA
- OSHA
- SOX
HIPAA, or the Health Insurance Portability and Accountability Act, is the regulation primarily concerned with protecting patient health information in the United States. It sets standards for healthcare data security and privacy.
To ensure the authenticity and integrity of data, digital signatures use cryptographic _______.
- Algorithms
- Hashes
- Keys
- Protocols
To ensure the authenticity and integrity of data, digital signatures use cryptographic hashes. Hash functions generate unique fixed-size values (hashes) based on the content of the data being signed, making it practically impossible for someone to alter the data without detection.