Search Header Logo
BYTEQUEST Round 2: "Vidya-Vaibhav" - CyberSecurity

BYTEQUEST Round 2: "Vidya-Vaibhav" - CyberSecurity

Assessment

Presentation

Computers

University

Practice Problem

Hard

Created by

Martin Purification

Used 1+ times

FREE Resource

1 Slide • 20 Questions

1

In the digital age, Sentinel is the backbone of global cybersecurity, protecting sensitive data and ensuring the integrity of crucial systems worldwide. Recently, a sophisticated cyber-attack has targeted Sentinel, threatening to compromise its defenses. A team of skilled cybersecurity experts is called in to restore order and secure the system before it’s too late.

Your mission is to navigate through Sentinel’s defenses, identify vulnerabilities, and implement solutions to fortify the system. Each question you solve brings you one step closer to securing Sentinel and safeguarding global security.

2

Multiple Choice

To prevent unauthorized devices from accessing Sentinel's network, the team should implement Network Access Control (NAC). What is the primary function of NAC in this context?

1

Encrypts data during transmission

2

Blocks all incoming traffic except what is explicitly allowed

3

Verifies the identity and authorization of devices attempting to connect

4

Converts domain names into IP addresses

3

Multiple Choice

A security policy that requires users to change their passwords regularly is called a __________ policy.

1
Rotation
2

Password expiration

3

Access control

4

Multi-factor authentication

4

Multiple Choice

The team discovers that Sentinel's website is under attack by overwhelming traffic, causing it to become inaccessible. This type of attack is known as a __________.

1

Phishing

2

Distributed Denial of Service (DDoS)

3

SQL Injection

4

Man-in-the-Middle

5

Multiple Choice

When users are given the least amount of access needed to perform their job, this is known as the principle of _____ .

1
least privilege
2

Maximum security

3

Role-based access

4

User authorization

6

Multiple Choice

To ensure data is unreadable to unauthorized users during transmission, the team should implement __________.

1

Encryption

2

Compression

3

Decryption

4

Conversion

7

Multiple Choice

Sentinel's system requires a security patch. This patch is a type of __________ that fixes vulnerabilities.

1
Update
2

Hotfix

3

Patch

4

Firmwar

8

Multiple Choice

The team notices unusual login attempts from different locations in a short period. This could be a sign of a __________ attack.

1

Brute force

2

Phishing

3

Distributed Denial of Service (DDoS)

4

Credential stuffing

9

Multiple Choice

To prevent data from being intercepted during transmission, Sentinel uses __________ to create a secure tunnel over the internet.

1
VPN
2

Encryption

3

Firewall

4

IDS

10

Multiple Choice

An attacker who disguises themselves as a legitimate service to steal sensitive information is performing a __________ attack.

1

Phishing

2

Spoofing

3

Sniffing

4

Man-in-the-Middle

11

Multiple Choice

To keep track of who accessed what data and when, Sentinel uses __________ logs.

1
Audit
2

System

3

End-to-End

4

Access

12

Multiple Choice

Sentinel's firewall blocks all incoming traffic except what is explicitly allowed. This is an example of a __________ firewall policy.

1

Blacklist

2

Whitelist

3

Open

4

Closed

13

Multiple Choice

When attackers exploit a vulnerability in software before the vendor has released a fix, this is called a __________ attack.

1

Zero Day

2

Buffer Overflow

3

Social Engineering

4

Replay

14

Multiple Choice

Sentinel encrypts all data stored on its servers. This type of encryption is known as __________ encryption.

1

At Rest

2

In-Transit

3

Symmetric

15

Multiple Choice

To ensure that only legitimate software is installed on Sentinel, the team uses __________ certificates to verify the software’s authenticity.

1
Digital
2

SSL

3

Encryption

4

Security

16

Multiple Choice

An attacker hides malicious code within a seemingly harmless program. This type of malware is called a __________.

1

Virus

2

Worms

3

Trojan

4

Spyware

17

Multiple Choice

Sentinel uses a __________ to translate domain names into IP addresses, making it easier to navigate the internet securely.

1
DNS
2

DHCP

3

NAT

4

IPsec

18

Multiple Choice

The team discovers that Sentinel's database has been injected with malicious code through a web form. This attack is known as __________.

1
SQL injection
2

Cross-Site Scripting (XSS)

3

Buffer Overflow

4

Clickjacking

19

Multiple Choice

To ensure that Sentinel can recover from a disaster, the team implements a __________ plan.

1

Backup

2

Security

3

Mitigation

4

Contigency

20

Multiple Choice

The process of converting encrypted data back into its original form is called __________.

1

Decryption

2

Encoding

3

Encryption

4

Decoding

21

Multiple Choice

The team needs to ensure that data cannot be altered without detection. This principle is known as data __________.

1

Integrity

2

Availability

3

Confidentiality

4

Authentication

In the digital age, Sentinel is the backbone of global cybersecurity, protecting sensitive data and ensuring the integrity of crucial systems worldwide. Recently, a sophisticated cyber-attack has targeted Sentinel, threatening to compromise its defenses. A team of skilled cybersecurity experts is called in to restore order and secure the system before it’s too late.

Your mission is to navigate through Sentinel’s defenses, identify vulnerabilities, and implement solutions to fortify the system. Each question you solve brings you one step closer to securing Sentinel and safeguarding global security.

Show answer

Auto Play

Slide 1 / 21

SLIDE