2023 Privacy And Information Security Quiz Albertsons
95 questions across 0 topics. Use the find bar or section chips to jump to what you need.
Which one of the following provides an authentication mechanism that would be appropriate for pairing with a password to achieve multifactor authentication?
Fingerprint scan
Jared is investigating a security incident and discovers that an attacker began with a normal user account but manager to exploit a system vulnerability to provide that account with administrative rights. What type of attack took place under the STRIDE threat model?
Elevation of privilege
Normally used an authorization tool?
Access Control List (ACL)
Jame's network begins to experience symptoms of slowness. After investigating he realizes that the network is being bombarded with TCP SYN packets and believes that his organization is the victim of a denial of service attack. What principle of information security is being violated?
Availability
Which one of the following individuals is normally responsible for fulfilling the operational data protection responsibilities delegated by senior management, such as validating data integrity, testing backups, and managing security policies?
Data custodian
Anne is the security administrator for a public school district. She is implementing a new student information system and is testing the code to ensure students are not able to alter their own grades. What principle of information security is Anne enforcing?
Integrity
Dominic discovers a keylogger hidden on the laptop of her company's chief executive officer. What information security principle is the keylogger designed to disrupt?
Confidentiality
What is the formula for used to determine risk?
Risk = Threat * Vulnerability
Catherine is working with the management team to classify data in an attempt to apply extra security controls that will limit the likelihood of a data breach. What principle of information security is Catherine attempting to enforce?
Confidentiality
Charlotte is designing a messaging system for a bank and would like to include a feature that allows the recipient of a message to prove to a third part that the message did indeed come from the purported originator. What goal is Charlotte trying to achieve?
Nonrepudiation
What principle of information security states that an organization should implement overlapping security controls whenever possible?
Defense in Depth
What tool is most often used for identification purposes and is not suitable for use as an authenticator?
Username
Which one of the following is an administrative control that can protect the confidentiality of information?
Nondisclosure agreement
Which IP address class contains exactly 256 addresses?
Class C
Which network tool can be used to protect the identity of clients while providing internet access by accept client requests, altering the source addresses of the requests, mapping requests to clients, and sending the modified requests out of their destination?
proxy server
During troubleshooting, Taylor uses the 'nslookup' command to check the IP address of a host he is attempting to connect to. The IP he sees in the response is not the IP that should resolve when the lookup is done. What type of attack has likely been conducted?
DNS poisoning
SMTP, HTTP, and SNMP all occur at which layer of the OSI Model?
Layer 7
Emily uses the ping utility to check whether a remote system is up as a part of a penetration testing exercise. If she wants to filter ping out by protocol, what should she filter out from her packet sniffer's logs?
ICMP
The DoD (TCP/IP) model's Application layer matches up to which three OSI model layers?
Application, Presentation, Session
Which OSI layer includes electrical specifications, protocols, and interface standards?
The physical layer
The Windows ipconfig command displays the following information: BC-5F-F4-7B-4B-7D. What term describes this and what information can be gathered from it?
The MAC address, the network interface card's manufacturer
What is the subnet mask for a Class B network?
255.255.0.0
How many bits are in an IPv4 address?
32
What is a secure way to remotely administer Linux systems?
SSH
Jose is installing a new Domain Name System. Which port should he open to allow traffic to his new service?
53
Beck wants to ensure that all external traffic is able to access her organization's front end servers but he also wants to protect access to her internal resources. Which network design element would you recommend Becky to use?
DMZ
Which of these hides an entire network of IP addresses?
NAT
How many IP addresses are in the CIDR range 192.168.1.0/24
256
What is the last rule contained within the ACLs of a firewall?
Implicit deny
What device would most likely have a DMZ interface?
Firewall
For a remote tech to log in to a user's Windows computer in another state, what inbound post must be open on the user's computer?
3389
A malicious insider is accused of stealing confidential data from your organization. What is the best way to identify the insider's computer?
MAC Address
Lists the packets of the TCP handshake in the correct order
SYN, SYN/ACK, ACK
Which of the following is an example of a physical asset that should be secured?
Data Center
Risa is designing a physical security infrastructure for a new computing facility that will remain largely unstaffed. She plans to implement motion detectors in the facility but would also like to include secondary verification control for physical presence. Which one of the following would best meet her needs?
CCTV
What type of access controls allow the owner of a file to grant other users access to it using an access control list?
Discretionary
Mandatory access control is based on what type of model?
Lattice-based
"Read down, write up" is typically associated with which type of access control?
Mandatory
Thomas has been asked to recommend whether her organization should use a mandatory access control scheme or a discretionary access control scheme. If flexibility and scalability is important requirement for implementing access controls, which scheme should she recommend and why?
DAC, because allowing individual administrators to make choices about the objects they control provides scalability and flexibility
Maggie starts her new job and finds that she has access to variety of systems that she does not need access to to accomplish her job. Which concept would best address the security issue concerning her access?
Least privilege
What type of access control is typically use by firewalls?
Rule-based
Anne has Secret clearance and is accessing files that use a mandatory access control scheme to apply the Top Secret, Secret, Confidential, and Unclassified label scheme. If her rights include the ability to access all data of her clearance level or lower, what classification levels of data can she access?
Secret, Confidential, and Unclassified
Which type of access control uses groups of users that have similar job functions to assign permissions?
Role-based
File permissions in a Linux system (eg. rwxrwxr--) are an example of what type of access control?
Discretionary
Which of the following is not a best practice for service accounts?
Account should be used for multiple services
Which of the following is not a strategy in risk management?
Hide the risk
Which type of risk assessment uses probability and impact to determine the significance of a risk?
Qualitative
What is the formula for calculating single loss expectancy (SLE)?
SLE = Asset Value * Exposure Factor
Which of the following is not a type of security control?
Associative
What do you call the method of penetration testing where the attackers have no previous knowledge of the target systems?
Black Box
What should be at the beginning of the report detailing the results of a penetration test?
Executive Summary
A group of compromised computers that have a software installed by a worm or Trojan allowing them to coordinate together is known as which of the following?
Botnet
Which of the following is a common symptom of adware?
Pop-up windows
Taylor is a network administrator. One day he notices that his DHCP server is flooded with information. He analyzes it and finds that the information is coming from more than 50 computers on the network. Which of the following is the most likely reason?
Worm
Which type of attack uses more than one computer?
DDos
Matthew believes that his computer has a worm. What is the best tool to use to remove that worm?
Antivirus Software
Which type of malware does not require a user to execute a program to distribute the software?
Worm
Which of the following defines the difference between a Trojan horse and a worm?
Worms self-replicate; Trojan horses do not
Emily complains of very slow system performance and says that a lot of antivirus messages are being displayed. She admits to recently installing pirated software and downloading and installing an illegal keygen to activate the software. What type of malware has probably affected the Emily's computer?
Trojan
Becky complains that she was browsing the Internet when her computer started acting erratically and crashed. You reboot the computer and notice that performance is very slow. In addition, after running a netstat command you notice literally hundreds of outbound connections to various websites, many of which are well-known sites. Which of the following has happened?
The computer is not part of a botnet
Risa is the security administrator for her organization and has just completed a routine server audit. She did not notice any abnormal activity. However, another network security analyst finds connections to unauthorized ports from outside the organization's network. Using security tools, the analyst finds hidden processes that are running on the server. Which of the following has most likely been installed on the server?
Rootkit
Which of the following concepts can ease administration but can be the victim of a malicious attack?
Backdoors
Sarah checks the application log of her web server and sees that someone attempted unsuccessfully to enter the text test; etc/password into an HTML form field. Which attack was attempted?
Command Injection
What's the best way to prevent SQL injection attacks on web applications?
Input validation
Which of the following attacks uses a JavaScript image tag in an e-mail?
Cross-site scripting
An attacker takes advantage of a vulnerability in programming that allows the attacker to copy more than 16 bytes to a standard 16-byte variable. Which attack is being initiated?
Buffer Overflow
Which of the following is NOT a good reason to implement monitoring and auditing?
To spy on employee activity
Which of the following is not a privileged administrative activity that should be automatically sent to a log of superuser actions?
Logging into a workstation
Which of the following is NOT a tool that helps you collect and aggregate logs?
Windows Defender
Which type of data backup requires to the least amount of disk space but is more prone to data loss if a backup is corrupted?
Incremental backup
Which of the following processes is used to determine which services impact an organization the most?
Business Impact Analysis
Which one of the following types of agreements is the most formal document that contains expectations about availability and other performance parameters between a service provider and a customer?
Service-Level agreement (SLA)
Which one of the following controls protects an organization in the event of a sustained period of power loss?
Generator
Jared is selecting a disaster recovery facility for his organization. He would like to choose a facility that has appropriate environmental controls and power for his operations but wants to minimize costs. He is willing to accept a lengthy recovery time. What type of facility should he choose?
Cold site
In the previous scenario, Jared also wants to make sure his organization remains available through fires, floods, tornadoes, and mass power outages. However he is under regulations requiring that none of his organization's data leave the United States. If his main data center is located in the University of Notre Dame's campus, which of the following is a suitable location for the backup data center?
Chicago
In asymmetric cryptography, how many different keys are needed for 4 users to exchange encrypted information between each pair while maintaining confidentiality from the other users?
8
Which of the following is a type of asymmetric algorithm?
RSA
Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority. If Alice wants to send Bob an encrypted message that only Bob can decrypt, which key should she use to encrypt her message?
Bob's public key
When Bob receives the message from Question 3, which key does he need to use to decrypt it?
Bob's private key
In the scenario from Question 3, which key is the only key that Alice should not have in her possession?
Bob's private key
If Alice also wants to digitally sign the message that she sends to Bob in Question 3, which key should she use to create the digital signature?
Alice's private key
What are the steps in creating a digital signature?
Hash message - encrypt message digest with senders private key - attach to message
Which of the following is NOT included in a digital certificate?
CA's public key
Which of the following is not a part of public key infrastructure?
Signature Authority
James is examining a digital certificate presented to him by his bank's website. Which one of the following requirements is not necessary for him to trust the digital certificate?
He knows that the server belongs to the bank
Chris wants to verify that a software package that he downloaded matches the original version. What hashing tool should he use, assuming the developer provided the relevant checksum, if he believes that technically sophisticated attackers may have replaced the software package with a version containing a backdoor?
SHA-2
Which of the following is the ciphertext resulting from a Caesar cipher encryption of the word 'IRISH' with a rotation of 1?
JSJTI
Alice sent a message to Bob. Bob would like to demonstrate to Charlie that the message he received definitely came from Alice. What goal of cryptography is Bob attempting to achieve?
Nonrepudiation
In symmetric cryptography, how many different keys are needed for 2 users to exchange encrypted information?
1
In symmetric cryptography, how many different keys are needed for 4 users to exchange encrypted information between each pair while maintaining confidentiality from the other users?
6
Jared intercepts an encrypted message and wants to determine what type of algorithm was used to create the message. He first performs frequency analysis and notes that the frequency of the letters in the message closely matches the distribution of letters in the English language. What type of cipher was most likely used to create this message?
Substitution
When does it make sense to use a shorter key when encrypting with AES?
When the encryption/decryption will occur on machines with limited processing power
CVE databases provide what type of information
Detailed vulnerability information
Which of the following is NOT a typical part of a penetration testing/vulnerability report?
All the sensitive data that was gathered during the test
James has been hired to perform a penetration test of Notre Dame Federal Credit Union's primary branch. In order to make the test as real as possible, he has not been given any information about Notre Dame Federal Credit Union other than its name and IP address space. What type of penetration test has James agreed to perform?
A black box penetration test
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials