1. A backdoor in a cryptographic system is:
Correct Answer: a) A secret method to bypass security mechanisms
Explanation: A backdoor is a hidden entry point that bypasses normal authentication procedures, often intentionally created but potentially exploited by attackers.
2. Trapdoors are often introduced by:
Correct Answer: a) Developers for debugging but exploited by attackers
Explanation: Developers may leave trapdoors for legitimate debugging purposes, but these become security vulnerabilities if discovered and exploited by malicious actors.
3. Which of the following is a real-world example of a backdoor?
Correct Answer: a) Dual_EC_DRBG (NSA's cryptographic backdoor)
Explanation: Dual_EC_DRBG was a pseudorandom number generator with a suspected NSA backdoor, allowing potential decryption of communications using a secret key.
4. How can backdoors be prevented?
Correct Answer: a) Code audits and secure development practices
Explanation: Prevention methods include: rigorous code reviews, secure coding standards, removing debugging code before production, and using checksums to detect modifications.
5. DNS Cache Poisoning redirects users to fake websites by:
Correct Answer: a) Modifying DNS resolver cache with false entries
Explanation: Attackers inject fraudulent DNS records into resolver caches, causing domain names to resolve to malicious IP addresses instead of legitimate ones.
6. ARP Cache Poisoning is used in:
Correct Answer: a) Man-in-the-Middle (MITM) attacks
Explanation: ARP poisoning associates the attacker's MAC address with the IP address of another host, intercepting network traffic intended for that host.
7. Which attack exploits the trust between a client and server by hijacking a session?
Correct Answer: a) Session Hijacking
Explanation: Session hijacking involves stealing or predicting session tokens to impersonate legitimate users and gain unauthorized access to systems.
8. A zero-day exploit refers to:
Correct Answer: a) A vulnerability unknown to the vendor, with no patch available
Explanation: Zero-day exploits target undisclosed vulnerabilities, giving developers "zero days" to fix them before attacks occur, making them particularly dangerous.
9. Which of the following is a preventive measure against security vulnerabilities?
Correct Answer: a) Regular software updates and patches
Explanation: Timely patching closes known vulnerabilities. Other preventive measures include: secure coding, least privilege, defense in depth, and security awareness training.
10. The principle of least privilege means:
Correct Answer: a) Users/programs get minimal access needed
Explanation: Least privilege limits damage from accidents or attacks by ensuring entities operate with only the permissions essential for their legitimate purpose.
11. Which attack floods a network with excessive requests to disrupt services?
Correct Answer: a) Denial-of-Service (DoS) Attack
Explanation: DoS attacks overwhelm systems with traffic (e.g., SYN floods) to make resources unavailable. DDoS uses multiple compromised systems for larger-scale attacks.
12. An example of a non-technical security threat is:
Correct Answer: a) Social Engineering (e.g., phishing)
Explanation: Social engineering manipulates human psychology rather than exploiting technical vulnerabilities. Examples include phishing, pretexting, baiting, and tailgating.