cs 5724 quiz 2 answers
.pdf
keyboard_arrow_up
School
University of Texas *
*We aren’t endorsed by this school
Course
1336
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
2
Uploaded by DoctorMusic9293
What is the primary purpose of a honeypot in cybersecurity?
A) To detect and neutralize malware
B) To monitor network traffic for potential threats
C) To simulate vulnerabilities and attract attackers
D) To encrypt sensitive data during transmission
Answer: C) To simulate vulnerabilities and attract attackers
What is the difference between symmetric and asymmetric encryption?
A) Symmetric encryption uses a single key for both encryption and decryption, while
asymmetric encryption uses different keys.
B) Symmetric encryption is faster but less secure than asymmetric encryption.
C) Asymmetric encryption is only used for data at rest, while symmetric encryption is
used for data in motion.
D) Asymmetric encryption is used for encrypting data on local storage, while symmetric
encryption is used for data in transit.
Answer: A) Symmetric encryption uses a single key for both encryption and decryption,
while asymmetric encryption uses different keys.
What is the main purpose of a Security Information and Event Management (SIEM)
system?
A) To encrypt sensitive data
B) To manage digital certificates
C) To monitor and analyze security events and incidents in real-time
D) To prevent social engineering attacks
Answer: C) To monitor and analyze security events and incidents in real-time
What does the acronym "XSS" stand for in the context of cybersecurity?
A) Cross-Site Scripting
B) XML Security Standard
C) External Security Service
D) Extended System Scan
Answer: A) Cross-Site Scripting
Which of the following is an example of a "man-in-the-middle" attack?
A) Exploiting a vulnerability in a web application to gain unauthorized access to a server
B) Intercepting and modifying communication between two parties without their
knowledge
C) Sending unsolicited emails with malicious attachments
D) Installing ransomware on a victim's computer
Answer: B) Intercepting and modifying communication between two parties without their
knowledge
What is the purpose of the "principle of least privilege" in cybersecurity?
A) To limit the access rights of users and processes to the bare minimum necessary to
perform their tasks
B) To prioritize security patches based on the severity of vulnerabilities
C) To conduct regular audits of network devices and systems
D) To implement strong encryption algorithms for data protection
Answer: A) To limit the access rights of users and processes to the bare minimum
necessary to perform their tasks
What is a "buffer overflow" vulnerability?
A) A type of denial-of-service attack
B) A vulnerability that allows an attacker to execute arbitrary code by overwriting
memory
C) A technique used to bypass authentication mechanisms
D) A form of social engineering attack targeting employees
Answer: B) A vulnerability that allows an attacker to execute arbitrary code by
overwriting memory
Which security concept involves disguising data so that it appears as random noise to
unauthorized users?
A) Encryption
B) Authentication
C) Obfuscation
D) Intrusion Detection
Answer: C) Obfuscation
What is the main purpose of a Virtual Private Network (VPN) in cybersecurity?
A) To prevent distributed denial-of-service (DDoS) attacks
B) To authenticate users using biometric data
C) To encrypt communication over untrusted networks
D) To scan for malware on network devices
Answer: C) To encrypt communication over untrusted networks
What is the primary goal of threat intelligence in cybersecurity?
A) To secure physical access to data centers
B) To provide real-time monitoring of network traffic
C) To proactively identify and mitigate potential security threats
D) To recover data after a security breach occurs
Answer: C) To proactively identify and mitigate potential security threats
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help