Fundamentals Practice Questions
1. What are the key elements considered in Attribute-based Access Control?
Access control lists and roles.
Usernames and passwords only.
Attributes of a person, resource, or environment.
IP addresses and network locations.
2. What does the 'C' in the CIA Triad stand for?
Cryptography
Compliance
Control
Confidentiality
3. Describe the concept of interruption in the context of information security and its
potential impact on an organization.
Interruption refers to attacks that make assets unusable or unavailable,
potentially disrupting business operations.
Interruption is a method of ensuring data integrity and
preventing unauthorized access.
Interruption involves the encryption of data to protect it from
unauthorized access.
,Interruption is a compliance regulation that mandates data
availability.
,4. What does interception mean from an attack perspective?
Communications between parts of the system are intercepted by an attacker
causing a loss of confidentiality
System services are attacked and cannot be delivered as
expected
Data or services in the system are changed by an attacker
Attacker generates information that should not exist & uses this
to gain some privileges
5. Which of the following is true about an intrusion detection system?
It is a software that captures suspicious network and host activity
data in event logs
It provides automatic tools to generate alarms
It provides query and reporting tools to help administrators
analyze the data interactively during and after an incident
None of the above
All of the above
6. What is the primary purpose of port scanning in ethical hacking?
To encrypt network traffic for secure communication
To launch DDoS attacks on target systems
To perform SQL injection attacks on web applications
To identify open ports and services on a target system
, 7. In a scenario where a company needs to secure internal communications, which
cryptographic method would be more efficient and why?