Which component of a digital certificate proves the identity of the certificate's subject?
- Certificate Authority's Signature
- Private Key
- Public Key
- Subject's Name
The Subject's Name in a digital certificate is what proves the identity of the certificate's subject. It typically contains information about the entity or individual the certificate is issued to, such as their name and organization.
For secure file transfers, SFTP operates on the _______ layer, while SCP operates on the _______ layer of the OSI model.
- Application, Data Link
- Data Link, Physical
- Presentation, Transport
- Transport, Network
For secure file transfers, SFTP (Secure File Transfer Protocol) operates at the Presentation layer of the OSI model, providing encryption, compression, and data formatting services. In contrast, SCP (Secure Copy Protocol) operates at the Transport layer of the OSI model, providing secure and efficient file transfer over a network.
For which reason might an organization regularly update its cybersecurity procedures?
- Branding Enhancement
- Business Expansion
- Compliance
- Cost Reduction
Organizations may regularly update their cybersecurity procedures to maintain compliance with evolving regulations and standards. Compliance is crucial as non-compliance can lead to legal issues and data breaches. Keeping procedures up-to-date helps an organization adapt to changing legal requirements.
A backup technique that captures every version of a file or database record every time it changes is referred to as _______ backup.
- Differential
- Full
- Incremental
- Versioning
A backup technique that captures every version of a file or database record every time it changes is referred to as "Versioning" backup. This type of backup maintains a history of changes, allowing you to restore a file or record to a specific point in time.
Which header can be used by web applications to instruct the browser to block certain types of attacks by declaring which sources are legitimate?
- Access-Control-Allow-Origin
- Content-Security-Policy
- Cross-Origin Resource Sharing
- Referrer-Policy
The "Content-Security-Policy" header is used to instruct the browser to block certain types of attacks, such as XSS, by specifying which sources are considered legitimate for loading content.
A software company releases a critical security update for its widely-used application. After a week, a major cyber attack targets organizations that have not applied this update. This scenario underscores the importance of what?
- Firewall Configuration
- Intrusion Detection
- Patch Management
- Secure Coding
This scenario highlights the critical importance of patch management. Failing to apply security updates promptly can leave systems vulnerable to known exploits.
Which type of malware typically does not replicate itself but allows unauthorized access to the affected computer?
- Trojan
- Worm
- Virus
- Spyware
A Trojan horse (option 1) is a type of malware that disguises itself as a legitimate software or file to trick users into downloading it. Unlike viruses or worms, Trojans typically do not replicate themselves. Once executed, they can provide unauthorized access to the affected computer.
Which policy allows employees to use their personal devices for official work, but also emphasizes security measures to protect company data?
- BYOB Policy
- COPE Policy
- CYOD Policy
- BYOD Policy
The policy that allows employees to use their personal devices for official work but also emphasizes security measures to protect company data is the BYOD (Bring Your Own Device) policy. This policy outlines guidelines and security measures to ensure that sensitive company information remains secure when accessed on personal devices.
When developing cybersecurity policies, what factor is crucial to ensure its effectiveness across the organization?
- Compliance with legal regulations
- Employee awareness and adherence
- Involving only the IT department
- Strong encryption techniques
Effective cybersecurity policies require not just compliance with regulations but also the active involvement of all employees. Employee awareness, understanding, and adherence to policies play a crucial role in ensuring organizational security.
Mike, an IT professional, finds a USB drive in the parking lot with a label reading "Salary Details 2023". Curious, he plugs it into his office computer, leading to the installation of malware. Which social engineering technique successfully targeted Mike?
- Spear Phishing
- Baiting
- Tailgating
- Pretexting
This scenario is an example of "Baiting." Baiting involves leaving physical devices, such as infected USB drives, in places where individuals might find them and be tempted to use them. Mike's curiosity led to the installation of malware.