Data security revision
Data security revision
1. What is a vulnerability?
a) The likelihood of a threat occurring
b) A weakness that can be exploited
c) The impact of a threat
d) An unauthorized access attempt
Answer: b
2. Which is NOT an example of a vulnerability?
a) Poorly designed network architecture
b) Properly patched software
c) Insecure password usage
d) Untested patches
Answer: b
3. What does a threat represent?
a) A specific system configuration
b) A potential exploit of a vulnerability
c) The consequence of an attack
d) A firewall failure
Answer: b
4. What is an attack vector?
a) A tool used for assessing risks
b) The path used by a malicious actor to exploit a vulnerability
c) A network monitoring device
d) A way of encrypting data
Answer: b
5. Risk is defined as:
a) The existence of vulnerabilities
b) The likelihood and impact of a threat exploiting a vulnerability
c) The tools used by hackers
d) The effectiveness of countermeasures
Answer: b
General Concepts
1. What does the term "cyber security" primarily focus on?
a) Protecting physical infrastructure
b) Securing digital systems, networks, and data
c) Improving internet speed
d) Enhancing software development
Answer: b
2. Which principle is NOT part of the CIA Triad?
a) Confidentiality
b) Integrity
c) Authorization
d) Availability
Answer: c
3. What is a key benefit of implementing strong cyber security measures?
a) Increased advertisement revenue
b) Protection of sensitive information
c) Faster processing speed
d) Unlimited internet access
Answer: b
4. What is a common violation of confidentiality?
a) Data hashing
b) Packet sniffing
c) Data redundancy
d) System upgrades
Answer: b
5. What type of attack involves tricking users into revealing sensitive information?
a) Phishing
b) DDoS
c) Hashing
d) Redundancy
Answer: a
6. Which attack involves overwhelming a system with requests?
a) Password cracking
b) DDoS
c) Brute force
d) Phishing
Answer: b
7. What is ransomware designed to do?
a) Encrypt data and demand payment
b) Steal passwords
c) Delete system files
d) Hijack network connections
Answer: a
8. Which of these is a social engineering attack?
a) Man-in-the-middle attack
b) Pretexting
c) SQL injection
d) Rainbow table attack
Answer: b
Mitigation Strategies
15. Which type of NSM data allows analysts to extract actual communication content?
a) Alert data
b) Transaction data
c) Full packet capture
d) Metadata
Answer: c
16. What is a primary challenge of alert data?
a) Inaccuracy due to false positives
b) Lack of detail
c) High storage needs
d) Difficult access
Answer: a
17. What does the 5-tuple in session data include?
a) Source IP, destination IP, protocol, source port, destination port
b) Session ID, username, protocol, timestamp, payload size
c) Source port, destination port, encryption key, username, password
d) Source MAC, destination MAC, source IP, destination IP, timestamp
Answer: a
18. Which log severity level represents the most critical events in Syslog?
a) Level 0
b) Level 3
c) Level 5
d) Level 7
Answer: a
General Overview
Session Data
Transaction Data
Extracted Content
Statistical Data
Alert Data