Which encryption protocol is commonly used by modern VPNs to secure data?

  • ARP (Address Resolution Protocol)
  • DHCP (Dynamic Host Configuration Protocol)
  • HTTP (Hypertext Transfer Protocol)
  • TLS (Transport Layer Security)
Modern VPNs commonly use TLS (Transport Layer Security) for data encryption. TLS ensures data confidentiality and integrity when transmitted over the internet.

Which type of attack targets vulnerabilities in a website's database by inserting malicious SQL code?

  • Cross-Site Scripting
  • Denial of Service Attack
  • Phishing Attack
  • SQL Injection
SQL Injection is an attack where an attacker inserts malicious SQL code into input fields to manipulate or extract data from a database.

Spear phishing and vishing are both techniques used in what kind of cyber attack?

  • DDoS Attack
  • Malware Attack
  • Man-in-the-Middle Attack
  • Social Engineering
Spear phishing and vishing are both types of social engineering attacks. Social engineering is a category of cyberattacks that manipulate individuals into revealing confidential information, typically through deceptive or manipulative means. Spear phishing targets specific individuals, while vishing involves voice communication.

A cryptographic method that requires two paired keys – one private and one public – is known as _______.

  • Asymmetric Key
  • Encryption
  • Hashing
  • Symmetric Key
An Asymmetric Key (or Public Key) cryptographic method uses two keys, one public and one private, for secure communication. Data encrypted with one key can only be decrypted with the other, providing a high level of security.

Which regulation primarily deals with the protection of patient health information in the U.S.?

  • FERPA
  • HIPAA
  • OSHA
  • SOX
HIPAA, or the Health Insurance Portability and Accountability Act, is the regulation primarily concerned with protecting patient health information in the United States. It sets standards for healthcare data security and privacy.

To ensure the authenticity and integrity of data, digital signatures use cryptographic _______.

  • Algorithms
  • Hashes
  • Keys
  • Protocols
To ensure the authenticity and integrity of data, digital signatures use cryptographic hashes. Hash functions generate unique fixed-size values (hashes) based on the content of the data being signed, making it practically impossible for someone to alter the data without detection.

In advanced firewalls, what capability allows the inspection of encrypted SSL/TLS traffic?

  • Deep Packet Inspection (DPI)
  • Intrusion Prevention System (IPS)
  • Port-based Filtering
  • Stateful Packet Inspection (SPI)
Deep Packet Inspection (DPI) enables the inspection of the actual content within encrypted SSL/TLS traffic, making it capable of identifying malicious content or patterns. This is a critical feature for advanced firewall security.

Which protocol is specifically designed for securely transferring files over a network and is based on the SSH protocol?

  • FTP
  • HTTP
  • SFTP
  • SMTP
SFTP (SSH File Transfer Protocol) is a network protocol designed for securely transferring files over a network. It's based on the SSH (Secure Shell) protocol, which provides a secure way to access and manage remote servers and their files. SFTP encrypts data during transmission, enhancing security.

An organization's intrusion detection system (IDS) flags an executable file behaving suspiciously, trying to access system files and sending data to an external IP. However, the file's signature is not present in the malware database. This situation might be an instance of:

  • APT (Advanced Persistent Threat)
  • False Positive
  • Polymorphic Malware
  • Zero-Day Exploit
In this situation, where the behavior is suspicious, but the file's signature is not recognized, it could be indicative of a zero-day exploit, which is an attack that exploits a vulnerability unknown to the software vendor.

Which part of the HIPAA regulation sets the standards for protecting electronic protected health information?

  • Title I
  • Title II
  • Title III
  • Title IV
Title II of the HIPAA (Health Insurance Portability and Accountability Act) regulation sets the standards for protecting electronic protected health information (ePHI). It includes the Security Rule, which outlines the requirements for securing ePHI.