Preview

02 - Cyber Security

 1. Which of the following statements are true of Asymmetric and Symmetric encryption?
1. Symmetric encryption uses the same key for both 
encryption and decryption

2. Symmetric is always much slower

3. Asymmetric is more secure but usually slower. 

  1 only

  1 and 3

  2 and 3

  1 and 2

 2. IDS is an intrusion detection system whereas an IPS is an intrusion _________ system.
cybersecurity_cert.jpg

 3. What is the following referring to? "A user enters a script in the client side input fields and the input gets processed without validation."

 4. Encryption is reversible whereas hashing is irreversible. Hashing can be cracked using rainbow tables and collision attacks but is not reversible.

  FALSE

  TRUE

 5. What is CSRF?

 6. __________ is process of sending messages in order to gather information about network, system etc. by analysing the response received

  Port scanning

  Black hat analysing

  Prevention cornering

  Port ministering

 7. What is the following referring to? "Abiding by a set of standards set by a government/Independent party/organisation."

 8. In case you cannot ping the final destination, ________ will help to identify where the connection stops or gets broken, whether it is firewall, ISP, router etc.

  tracert

  cmd

  ping x

  netstat

 9. DDoS stands for disintegrating denial of stops (attack).

  FALSE

  TRUE

 10. ____________ is filtering of unnecessary services running on various ports and removal of default test scripts from the servers.

  Service softening

  Denial filtering

  Main server filtering

  Web server hardening

 11. _____ is a standard security technology for creating an encrypted link between a server and a client (usually a web server and a web browser).

  SST

  SSL

  SML

  STS

 12. If you had to both compress and encrypt data during a transmission, which would you do first?

  Encrypt first and then compress. This makes compression more effective.

  Compress first, and never encrypt if you have compressed.

  Encrypt first. That's the golden rule of security.

  Compress and then encrypt, since encrypting first might make it hard to show compression having an effect.

 13. RDP stands for Remote desktop protocol, and its port number is 3389.

  TRUE

  FALSE

 14. Name the two protocols for sending packets of information over the internet. They are built on top of the internet protocol.

 15. TLS is transport layer security and is a ______________ to SSL.

  far older protocol

  inferior protocol

  successor protocol

  smaller protocol