March 2025 Flashcard

March 2025 Flashcard

Assessment

Flashcard

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

5 questions

Show all answers

1.

FLASHCARD QUESTION

Front

As a cybersecurity expert, you work for... Options: FBI, NSA, CIA, DIA

Back

CIA

Answer explanation

CIA stands for the CIA Triad, which is a fundamental model used to guide policies and strategies for protecting information

  1. Confidentiality: data is accessed only by authorized individuals or systems.

  2. Integrity: data remains accurate, consistent, and unaltered

  3. Availability: data are accessible to authorized users when needed

2.

FLASHCARD QUESTION

Front

Which type of attack involves exploiting physical implementation of a system rather than weaknesses in its algorithms?

Back

Side-Channel Attack

Answer explanation

A side-channel attack exploits physical characteristics of a system, such as power consumption, timing, electromagnetic emissions, or acoustic signals, to extract sensitive information. Common types include:

  • Timing Attacks: Analyze execution time to deduce secret keys.

  • Power Analysis Attacks: Examine power usage patterns to infer cryptographic keys.

  • Electromagnetic Attacks: Capture emissions to gain data insights.

  • Cache Attacks: Exploit cache memory behavior to infer accessed data.

These attacks target the physical implementation rather than software vulnerabilities. Countermeasures include constant-time algorithms, power masking, and shielding.


3.

FLASHCARD QUESTION

Front

Find the odd one out: BB-8, C-3PO, Z-3NX, R2-D2

Back

Z-3NX

Answer explanation

Media Image

Despite Z-3NX is a highly advanced reconnaissance droid designed for stealth missions and intelligence gathering, he never joined the Rebel Alliance or the Galactic Empire

4.

FLASHCARD QUESTION

Front

Which attack involves exploiting a vulnerability in the SSL/TLS protocol to intercept and decrypt secure communications? Options: Heartbleed, Poodle, Tuxnet, WannaCry

Back

Poodle

Answer explanation

The POODLE attack (Padding Oracle On Downgraded Legacy Encryption) is a security vulnerability that exploits a weakness in the SSL 3.0 protocol.

The Heartbleed bug is a serious vulnerability in the OpenSSL cryptographic library, which is widely used to implement the SSL/TLS protocols. However, it does not directly intercept and decrypt communications.

5.

FLASHCARD QUESTION

Front

The hexadecimal code 0x474747 refers to?

Back

A piece of music

Answer explanation

0x474747 corresponds to the ASCII representation of the characters "GGG".

The opening motif of Beethoven's 5th Symphony is famously G G G E♭, which makes "GGG" a recognizable reference to this piece of music.