Which security measure can prevent attackers from capturing session IDs by listening to network traffic between the client and server?
- Cross-Site Request Forgery
- HTTPS Encryption
- Rate Limiting
- Secure Cookies
HTTPS (HyperText Transfer Protocol Secure) encryption is a security measure that encrypts data in transit between the client and server, making it difficult for attackers to capture session IDs by eavesdropping on network traffic. It's a fundamental method for ensuring data privacy and security during transmission.
What is the primary advantage of using a biometric authentication method, such as fingerprint or facial recognition?
- Easy to Implement
- High Efficiency
- Low Cost
- Strong Security
The primary advantage of biometric authentication methods like fingerprint or facial recognition is their strong security. Biometrics provide a high level of security because they are based on unique physical or behavioral characteristics, making it extremely difficult for unauthorized users to gain access. These methods are challenging to fake or replicate, enhancing security.
Which device is typically used to segment a network and control incoming and outgoing network traffic based on security policies?
- Hub
- Modem
- Router
- Switch
A router is used to segment a network and control network traffic based on security policies by directing traffic between different network segments, effectively acting as a gateway for traffic control.
Which stage of security incident response is focused on eradicating the root cause of the incident?
- Analysis
- Containment
- Identification
- Recovery
The 'Analysis' stage focuses on identifying the root cause of the incident by examining how the breach occurred. Once the root cause is known, efforts can be directed toward eradicating it and preventing future occurrences.
Which technology encrypts the entire hard drive, ensuring that the data on the disk is secure even if the computer is lost or stolen?
- AES
- BitLocker
- Firewall
- TPM
BitLocker is a full-disk encryption feature included with Microsoft Windows. It encrypts the entire hard drive, making it unreadable without the proper decryption key. This ensures the security of data on the disk, even if the computer is lost or stolen.
One of the primary components of DLP is _______ detection, which analyzes communication patterns for potential data exfiltration.
- Anomaly
- Behavioral
- Intrusion
- Malware
One of the primary components of DLP (Data Loss Prevention) is Anomaly detection, which analyzes communication patterns for potential data exfiltration. Anomaly detection looks for unusual patterns that may indicate data breaches or unauthorized access.
A cloud service provider promises to maintain certain security measures to protect its customer's data. To ensure this, the customer asks for a third-party attestation regarding the provider's security practices. This is an example of seeking which type of assurance?
- Regulatory compliance assurance
- Service Level Agreement (SLA) assurance
- Third-party security assessment
- Vendor self-assessment assurance
Seeking a third-party security assessment ensures an independent evaluation of the cloud provider's security measures, providing customers with assurance that their data will be adequately protected.
In the context of IPsec, what does AH stand for and what is its primary function?
- Access Handler
- Address Header
- Application Host
- Authentication Header
AH stands for Authentication Header in IPsec. Its primary function is to provide data integrity, authentication, and anti-replay protection for the IP packets, ensuring that they have not been tampered with during transit.
In a sandboxing approach for malware detection, suspicious files are executed in what kind of environment?
- A public cloud environment
- A secure and isolated environment
- The system's production environment
- The user's personal device
In a sandboxing approach for malware detection, suspicious files are executed in a secure and isolated environment, separate from the user's system. This isolation prevents malware from affecting the production system and allows security analysts to observe and analyze its behavior.
In the context of wireless networks, what does WPA stand for?
- Wi-Fi Printing Adapter
- Wi-Fi Protected Access
- Wireless Personal Area
- Wireless Public Access
WPA stands for Wi-Fi Protected Access, a security protocol used in wireless networks to protect data and control access, providing enhanced security compared to older WEP (Wired Equivalent Privacy) standards.