What term describes the GDPR requirement for organizations to design data protection into their products and processes from the outset?
- Data Encryption
- Data Minimization
- Data Portability
- Data Protection by Design and by Default
GDPR (General Data Protection Regulation) requires organizations to implement "Data Protection by Design and by Default." This means that data protection must be an integral part of product and process development, ensuring data security from the start rather than added as an afterthought.
The principle of "_______" ensures that critical tasks or functions are not controlled by a single individual.
- Access Control
- Defense in Depth
- Least Privilege
- Vulnerability Scanning
The principle of "Least Privilege" is a security concept that restricts individual users' access rights to the minimum levels necessary to accomplish their tasks. It ensures that no single person has excessive access, reducing the risk of unauthorized actions or potential damage.
In the context of mobile security, what does BYOD stand for?
- Bring Your Own Data
- Bring Your Own Device
- Build Your Own Device
- Business Yearning Over Devices
BYOD stands for "Bring Your Own Device." This policy allows employees to use their personal devices (such as smartphones, tablets, or laptops) for official work purposes. It can enhance flexibility and productivity but also poses security challenges that need to be addressed.
A primary technique to mitigate code injection attacks is to avoid executing code that is:
- Dynamic
- Encoded
- Trusted
- Untrusted
Mitigating code injection attacks involves not executing untrusted code. Untrusted code can contain malicious commands that may lead to security vulnerabilities.
What is the primary purpose of disk encryption?
- Improve disk performance
- Prevent physical damage
- Protect data from unauthorized access
- Reduce storage space
The primary purpose of disk encryption is to protect data from unauthorized access. When data on a disk is encrypted, it is converted into a form that can only be read with the correct decryption key or password, making it inaccessible to unauthorized users. This helps safeguard sensitive information even if the physical disk is lost or stolen.
The process of ensuring that both parties in a communication are who they claim to be, especially in the SSL/TLS handshake, is known as what?
- Authentication
- Authorization
- Decryption
- Encryption
Authentication is the process of verifying the identity of parties in a communication. In SSL/TLS, it ensures that the client and server are who they claim to be, typically using digital certificates.
What is the primary difference between SSL and its successor, TLS?
- SSL is faster
- SSL is older
- TLS is a separate protocol
- TLS is more secure
The primary difference is that TLS (Transport Layer Security) is an updated version of SSL (Secure Sockets Layer). They serve the same purpose, but TLS has addressed vulnerabilities present in SSL, making it more secure. TLS is a separate protocol with improvements over SSL.
A _______ is a set of predefined rules in a firewall that determines whether to allow or block specific traffic.
- Access Control List (ACL)
- DNS Server
- Encryption Algorithm
- Intrusion Detection System
An Access Control List (ACL) is a set of rules used in a firewall to control traffic by allowing or blocking based on defined criteria.
The process of converting encrypted data back into its original form is termed as _______.
- Deciphering
- Encoding
- Encryption
- Hashing
The process of converting encrypted data back into its original form is termed as "Deciphering." This process uses the decryption key to transform the encrypted data into its original, readable format.
Which of the following is NOT a recommended practice to prevent SQL injection?
- Sanitizing Input
- Storing Passwords in Plain Text
- Using Dynamic Queries
- Using Prepared Statements
Using dynamic queries is not recommended to prevent SQL injection. It opens the door to SQL injection attacks by allowing user input directly in SQL queries.