March 2025 Flashcard

March 2025 Flashcard

Assessment

Flashcard

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

5 questions

Show all answers

1.

FLASHCARD QUESTION

Front

As a cybersecurity expert, you work for... Options: FBI, NSA, CIA, DIA

Back

CIA

Answer explanation

CIA stands for the CIA Triad, which is a fundamental model used to guide policies and strategies for protecting information

  1. Confidentiality: data is accessed only by authorized individuals or systems.

  2. Integrity: data remains accurate, consistent, and unaltered

  3. Availability: data are accessible to authorized users when needed

2.

FLASHCARD QUESTION

Front

Which type of attack involves exploiting physical implementation of a system rather than weaknesses in its algorithms?

Back

Side-Channel Attack

Answer explanation

A side-channel attack exploits physical characteristics of a system, such as power consumption, timing, electromagnetic emissions, or acoustic signals, to extract sensitive information. Common types include:

  • Timing Attacks: Analyze execution time to deduce secret keys.

  • Power Analysis Attacks: Examine power usage patterns to infer cryptographic keys.

  • Electromagnetic Attacks: Capture emissions to gain data insights.

  • Cache Attacks: Exploit cache memory behavior to infer accessed data.

These attacks target the physical implementation rather than software vulnerabilities. Countermeasures include constant-time algorithms, power masking, and shielding.


3.

FLASHCARD QUESTION

Front

Find the odd one out: BB-8, C-3PO, Z-3NX, R2-D2

Back

Z-3NX

Answer explanation

Media Image

Despite Z-3NX is a highly advanced reconnaissance droid designed for stealth missions and intelligence gathering, he never joined the Rebel Alliance or the Galactic Empire

4.

FLASHCARD QUESTION

Front

Which attack involves exploiting a vulnerability in the SSL/TLS protocol to intercept and decrypt secure communications? Options: Heartbleed, Poodle, Tuxnet, WannaCry

Back

Poodle

Answer explanation

The POODLE attack (Padding Oracle On Downgraded Legacy Encryption) is a security vulnerability that exploits a weakness in the SSL 3.0 protocol.

The Heartbleed bug is a serious vulnerability in the OpenSSL cryptographic library, which is widely used to implement the SSL/TLS protocols. However, it does not directly intercept and decrypt communications.

5.

FLASHCARD QUESTION

Front

The hexadecimal code 0x474747 refers to?

Back

A piece of music

Answer explanation

0x474747 corresponds to the ASCII representation of the characters "GGG".

The opening motif of Beethoven's 5th Symphony is famously G G G E♭, which makes "GGG" a recognizable reference to this piece of music.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?