Q UESTIONS
Q UESTIONS
Answer:
Answer:
A risk assessment is the process of identifying, evaluating, and analyzing potential risks
(threats and vulnerabilities) to an organization’s assets and operations. It is important because
it helps an organization prioritize its security efforts, allocate resources efficiently, and
mitigate risks before they lead to financial, reputational, or operational damage.
Answer:
Defense in Depth is a security strategy that employs multiple layers of defense mechanisms
to protect information and systems. This means even if one layer of defense fails, there are
additional layers to stop or mitigate the attack. These layers may include firewalls,
encryption, intrusion detection systems, access controls, and employee training.
Answer:
Threat: A potential event or action that could exploit a vulnerability and harm an
asset (e.g., hackers, natural disasters).
Vulnerability: A weakness or flaw in a system that can be exploited by a threat (e.g.,
outdated software, misconfigured network settings).
Risk: The likelihood and impact of a threat exploiting a vulnerability to cause damage
(Risk = Threat × Vulnerability × Impact).
5. What is social engineering, and what are some common types of social
engineering attacks?
Answer:
Social engineering is a manipulation technique used by cybercriminals to trick individuals
into revealing confidential information or performing actions that compromise security.
Common types of social engineering attacks include:
6. What is an intrusion detection system (IDS), and how does it differ from an
intrusion prevention system (IPS)?
Answer:
Intrusion Detection System (IDS): A security system that monitors network traffic
for signs of malicious activity or policy violations and alerts administrators when
suspicious activity is detected.
Intrusion Prevention System (IPS): An advanced system that not only detects
malicious activity but also actively blocks or prevents any detected threats from
causing harm to the system or network.
Answer:
Encryption ensures data confidentiality by converting readable data into an unreadable format
(ciphertext), which can only be decrypted by those with the correct decryption key.
Symmetric encryption uses the same key for both encryption and decryption,
making it faster but requiring secure key management.
Asymmetric encryption uses a pair of keys—one public and one private—where the
public key encrypts data, and the private key decrypts it, offering greater security, but
it is slower than symmetric encryption.
Answer:
A Denial-of-Service (DoS) attack aims to make a computer, network, or service
unavailable by overwhelming it with traffic or requests.
A Distributed Denial-of-Service (DDoS) attack is a more advanced version, where
the attack comes from multiple, distributed sources (often botnets), making it harder
to defend against and mitigate.
Answer:
An Incident Response Plan (IRP) outlines the steps an organization will take to respond to a
cybersecurity incident. Key components include:
10. What is the difference between a public key infrastructure (PKI) and a
simple certificate authority (CA)?
Answer:
Public Key Infrastructure (PKI): A framework for managing digital keys and
certificates to secure communications through encryption, digital signatures, and other
security mechanisms. It involves key generation, distribution, storage, and revocation.
Certificate Authority (CA): A trusted entity that issues digital certificates to verify
the identity of organizations or individuals. It is one component of PKI, which also
involves registration authorities (RAs), certificate revocation lists (CRLs), and more.
11. What is the purpose of Multi-factor Authentication (MFA), and how does
it strengthen security?
Answer:
Multi-factor Authentication (MFA) enhances security by requiring users to provide two or
more different forms of verification before gaining access to a system. This typically involves
something the user knows (password), something they have (a smartphone or token), and
something they are (fingerprint or facial recognition). By requiring multiple factors, MFA
makes it harder for attackers to gain unauthorized access.
Answer:
Least privilege is the principle that users, systems, and applications should only be given the
minimum level of access or permissions necessary to perform their tasks. It minimizes the
potential damage from insider threats, reduces the attack surface, and prevents unauthorized
access to sensitive data and systems.
Answer:
A vulnerability scanner is a tool that automatically scans systems, applications, or networks
for known vulnerabilities or security weaknesses. It is used in a security program to identify
potential risks, help patch systems, and assess the effectiveness of security measures.