Preview

04 - Cyber Security

 1. Networks like the internet are wonderful inventions and they are risk-free and completely safe.
Note: The video provides an insight into cyber security

  FALSE

  TRUE

 2. The security that is associated with networks and particularly the internet is called:

  internet safehavenity

  cyber dangerauthority

  sentinel security

  cyber security or 'cybersecurity'

 3. One method of data interception is:

  logging in to an authorised web server

  listening to radio waves with a thermometer

  breaking into a cable and physically peering through it

  listening to communications between users without their permission

 4. If you are sending confidential information over the internet, such as purchasing something, you should always:

  use https

  use smtp

  use ftp

  use http

 5. Criminals that operate on networks like the internet are sometimes called:

  criminal netties

  internetoes

  hackos

  cyber criminals

 6. A hacker recognises the value in your _____________________ and this is often the target of a cyber attack.

  house number

  public encryption key

  model of phone or device

  personal data

 7. The good news is that complete prevention of any attack is possible as all attack methods are now known.

  FALSE

  TRUE

 8. Fill in the blanks on the following definition of cyber security
Cybersecurity, computer security or IT security is the protection of 
computer systems from _____ of or ______ to their hardware, 
software or electronic data, as well as from disruption or 
misdirection of the services they provide

  theft / authorised editing

  theft / shine

  unauthorised use / damage

  validation / verification

 9. ____________are weaknesses in design, implementation, operation or internal control.
Most of the _________________ that have been discovered are documented in the Common _________________ and Exposures (CVE) database

  weakners

  venerables

   vulnerabilities

  exposures

 10. Vulnerabilities are often hunted or exploited with the aid of automated tools or manually using customized scripts

  FALSE

  TRUE

 11. Which of the following statements are true of Asymmetric and Symmetric encryption?
1. Symmetric encryption uses the same key for both 
encryption and decryption

2. Symmetric is always much slower

3. Asymmetric is more secure but usually slower. 

  1 and 3

  1 only

  1 and 2

  2 and 3

 12. IDS is an intrusion detection system whereas an IPS is an intrusion _________ system.
cybersecurity_cert.jpg

 13. What is the following referring to? "A user enters a script in the client side input fields and the input gets processed without validation."

 14. Encryption is reversible whereas hashing is irreversible. Hashing can be cracked using rainbow tables and collision attacks but is not reversible.

  TRUE

  FALSE

 15. What is CSRF?

 16. __________ is process of sending messages in order to gather information about network, system etc. by analysing the response received

  Port ministering

  Port scanning

  Black hat analysing

  Prevention cornering

 17. What is the following referring to? "Abiding by a set of standards set by a government/Independent party/organisation."

 18. In case you cannot ping the final destination, ________ will help to identify where the connection stops or gets broken, whether it is firewall, ISP, router etc.

  ping x

  netstat

  tracert

  cmd

 19. DDoS stands for disintegrating denial of stops (attack).

  FALSE

  TRUE

 20. ____________ is filtering of unnecessary services running on various ports and removal of default test scripts from the servers.

  Web server hardening

  Denial filtering

  Service softening

  Main server filtering

 21. _____ is a standard security technology for creating an encrypted link between a server and a client (usually a web server and a web browser).

  SSL

  STS

  SST

  SML

 22. If you had to both compress and encrypt data during a transmission, which would you do first?

  Encrypt first and then compress. This makes compression more effective.

  Compress first, and never encrypt if you have compressed.

  Encrypt first. That's the golden rule of security.

  Compress and then encrypt, since encrypting first might make it hard to show compression having an effect.

 23. RDP stands for Remote desktop protocol, and its port number is 3389.

  TRUE

  FALSE

 24. Name the two protocols for sending packets of information over the internet. They are built on top of the internet protocol.

 25. TLS is transport layer security and is a ______________ to SSL.

  smaller protocol

  successor protocol

  far older protocol

  inferior protocol