cs 5724 quiz 2 answers

.pdf

School

University of Texas *

*We aren’t endorsed by this school

Course

1336

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

2

Uploaded by DoctorMusic9293

What is the primary purpose of a honeypot in cybersecurity? A) To detect and neutralize malware B) To monitor network traffic for potential threats C) To simulate vulnerabilities and attract attackers D) To encrypt sensitive data during transmission Answer: C) To simulate vulnerabilities and attract attackers What is the difference between symmetric and asymmetric encryption? A) Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses different keys. B) Symmetric encryption is faster but less secure than asymmetric encryption. C) Asymmetric encryption is only used for data at rest, while symmetric encryption is used for data in motion. D) Asymmetric encryption is used for encrypting data on local storage, while symmetric encryption is used for data in transit. Answer: A) Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses different keys. What is the main purpose of a Security Information and Event Management (SIEM) system? A) To encrypt sensitive data B) To manage digital certificates C) To monitor and analyze security events and incidents in real-time D) To prevent social engineering attacks Answer: C) To monitor and analyze security events and incidents in real-time What does the acronym "XSS" stand for in the context of cybersecurity? A) Cross-Site Scripting B) XML Security Standard C) External Security Service D) Extended System Scan Answer: A) Cross-Site Scripting Which of the following is an example of a "man-in-the-middle" attack? A) Exploiting a vulnerability in a web application to gain unauthorized access to a server B) Intercepting and modifying communication between two parties without their knowledge C) Sending unsolicited emails with malicious attachments D) Installing ransomware on a victim's computer Answer: B) Intercepting and modifying communication between two parties without their knowledge What is the purpose of the "principle of least privilege" in cybersecurity? A) To limit the access rights of users and processes to the bare minimum necessary to perform their tasks B) To prioritize security patches based on the severity of vulnerabilities C) To conduct regular audits of network devices and systems D) To implement strong encryption algorithms for data protection
Answer: A) To limit the access rights of users and processes to the bare minimum necessary to perform their tasks What is a "buffer overflow" vulnerability? A) A type of denial-of-service attack B) A vulnerability that allows an attacker to execute arbitrary code by overwriting memory C) A technique used to bypass authentication mechanisms D) A form of social engineering attack targeting employees Answer: B) A vulnerability that allows an attacker to execute arbitrary code by overwriting memory Which security concept involves disguising data so that it appears as random noise to unauthorized users? A) Encryption B) Authentication C) Obfuscation D) Intrusion Detection Answer: C) Obfuscation What is the main purpose of a Virtual Private Network (VPN) in cybersecurity? A) To prevent distributed denial-of-service (DDoS) attacks B) To authenticate users using biometric data C) To encrypt communication over untrusted networks D) To scan for malware on network devices Answer: C) To encrypt communication over untrusted networks What is the primary goal of threat intelligence in cybersecurity? A) To secure physical access to data centers B) To provide real-time monitoring of network traffic C) To proactively identify and mitigate potential security threats D) To recover data after a security breach occurs Answer: C) To proactively identify and mitigate potential security threats
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help