In the context of access control, the decision to grant or deny a user's request is referred to as _______.
- Authentication
- Authorization
- Validation
- Verification
Authorization is the process of deciding whether a user's request should be granted or denied. It's the step that follows authentication and validation and determines the level of access a user has to resources based on their permissions or privileges.
The process of examining code for security vulnerabilities before it's executed in a live environment is known as?
- Code Review
- Dynamic Testing
- Pre-execution Analysis
- Runtime Analysis
Code review is the process of examining code for security vulnerabilities before it's executed in a live environment. This helps identify and fix security issues in the code.
In TLS, what cryptographic process is used to establish a shared secret between the client and server without ever transmitting the secret itself?
- DES Encryption
- Diffie-Hellman Key Exchange
- MD5 Hash Algorithm
- RSA Key Exchange
In TLS, the Diffie-Hellman Key Exchange is used to establish a shared secret without transmitting the secret itself. This process allows secure key exchange even if eavesdroppers are present.
Which of the following is a globally recognized standard for information security management?
- Commercial Off-the-Shelf Software (COTS)
- Company Trademark Policy
- ISO/IEC 27001
- Internal Company Policy
ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It provides a systematic approach for managing sensitive company information, ensuring its confidentiality, integrity, and availability.
Which method of encryption uses the same key for both encryption and decryption processes?
- Asymmetric Key Encryption
- Public Key Encryption
- Secure Sockets Layer
- Symmetric Key Encryption
Symmetric Key Encryption, also known as Private Key Encryption, uses the same key for both the encryption and decryption processes. It's efficient for fast and secure data transfer, but it requires a secure way to share the key between the sender and receiver.
A primary technique to mitigate code injection attacks is to avoid executing code that is:
- Dynamic
- Encoded
- Trusted
- Untrusted
Mitigating code injection attacks involves not executing untrusted code. Untrusted code can contain malicious commands that may lead to security vulnerabilities.
What is the primary purpose of disk encryption?
- Improve disk performance
- Prevent physical damage
- Protect data from unauthorized access
- Reduce storage space
The primary purpose of disk encryption is to protect data from unauthorized access. When data on a disk is encrypted, it is converted into a form that can only be read with the correct decryption key or password, making it inaccessible to unauthorized users. This helps safeguard sensitive information even if the physical disk is lost or stolen.
The process of ensuring that both parties in a communication are who they claim to be, especially in the SSL/TLS handshake, is known as what?
- Authentication
- Authorization
- Decryption
- Encryption
Authentication is the process of verifying the identity of parties in a communication. In SSL/TLS, it ensures that the client and server are who they claim to be, typically using digital certificates.
Which component of a digital certificate proves the identity of the certificate's subject?
- Certificate Authority's Signature
- Private Key
- Public Key
- Subject's Name
The Subject's Name in a digital certificate is what proves the identity of the certificate's subject. It typically contains information about the entity or individual the certificate is issued to, such as their name and organization.
For secure file transfers, SFTP operates on the _______ layer, while SCP operates on the _______ layer of the OSI model.
- Application, Data Link
- Data Link, Physical
- Presentation, Transport
- Transport, Network
For secure file transfers, SFTP (Secure File Transfer Protocol) operates at the Presentation layer of the OSI model, providing encryption, compression, and data formatting services. In contrast, SCP (Secure Copy Protocol) operates at the Transport layer of the OSI model, providing secure and efficient file transfer over a network.