Attacks/Encryptions/Regs CEH 2.5

Attacks/Encryptions/Regs CEH 2.5

Professional Development

6 Qs

quiz-placeholder

Similar activities

Android Fundamentals - Day 2 : Android Basics

Android Fundamentals - Day 2 : Android Basics

University - Professional Development

10 Qs

Pretest Common Criteria

Pretest Common Criteria

University - Professional Development

9 Qs

2d Roadshow | Trend Micro

2d Roadshow | Trend Micro

Professional Development

7 Qs

SLOT 1: Foundation 1

SLOT 1: Foundation 1

Professional Development

10 Qs

CJS - Cyber Hygiene & Cybersecurity Awareness Workshop

CJS - Cyber Hygiene & Cybersecurity Awareness Workshop

Professional Development

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Class 4 Cycle 4

Class 4 Cycle 4

Professional Development

8 Qs

Digital Skills

Digital Skills

Professional Development

10 Qs

Attacks/Encryptions/Regs CEH 2.5

Attacks/Encryptions/Regs CEH 2.5

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Prem Jadhwani

Used 2+ times

FREE Resource

6 questions

Show all answers

1.

MATCH QUESTION

3 mins • 1 pt

Match the following attack types.

aLTEr Attack

Targets an LTE network and intercepting information between a mobile device and the network tower.

DUHK Attack

Attacker gains access to Hard Coded Keys used in a Random Number generator (RNG) and can use them to compromise communications.

DROWN Attack

Hacker intercepts communications between a user's web browser and a server and is able to decrypt the information.

POODLE Attack

An attacker making a computer talk to another computer very, very slow to draw out a conversation.

Slowloris Attack

Leverages weaknesses in web servers that accepts deprecated SSL protocols, allowing an attacker to decrypt sensitive information.

2.

MATCH QUESTION

3 mins • 1 pt

Match the following attack types:

Trident

A malicious software program that attempts to replicate itself onto other programs.

DroidSheep

an attacker uses a cryptographic attack that exploits information gained from padding errors in an encryption system.

Agent Smith Attack

Android application that is known for its use in demonstrating security vulnerabilities rather than for malicious purposes

Deauthentication Attack

Attacker collects information by sending a deauthentication message that will cause a device to send a reauthentication request to a server.

Padding Oracle Attack

A vulnerability that allows and attacker to jailbreak an IOS device and install Pegasus Software.

3.

MATCH QUESTION

3 mins • 1 pt

Match the following CVSS Scores.

9.0-10.0

None

7.0-8.9

Medium

4.0-6.9

Critical

0.1-3.9

Low

0.0-0.1

High

4.

MATCH QUESTION

3 mins • 1 pt

Match the following regulations.

PCI DSS

federal law that defines a comprehensive framework to protect government information, operations, and assets. requires Federal agencies to develop and maintain security programs.

FedRAMP

U.S. government program that standardizes the security assessment, authorization, and continuous monitoring processes for cloud products and services. It aims to ensure that cloud solutions used by federal agencies meet specific security standards.

GLBA

U.S. law that addresses the protection of consumers' personal financial information held by financial institutions. It requires institutions to establish privacy and security programs to safeguard sensitive financial data.

SOX

a set of security standards designed to ensure the secure handling of credit card information during transactions. It applies to organizations that process, store, or transmit credit card data and aims to prevent data breaches and theft of cardholder information.

FISMA

U.S. federal law enacted to enhance corporate governance and financial reporting transparency. It establishes requirements for financial reporting, internal controls, and the accountability of corporate officers to prevent fraudulent activities.

Answer explanation

FISMA (Federal Information Security Management Act)

HIPAA (Health Insurance Portability and Accountability Act)

SOX (Sarbanes-Oxley Act)

FedRAMP (Federal Risk and Authorization Management Program)

GLBA (Gramm-Leach-Bliley Act)

PCI DSS (Payment Card Industry Data Security Standard)

5.

CLASSIFICATION QUESTION

3 mins • 1 pt

Match the following encryption types to the correct category.

Groups:

(a) Symmetric (1-Key)

,

(b) Asymmetric (2-Key)

,

(c) Hash

AES

Blowfish

Two Fish

Diffie Hellman

SHA256

MD5

Whirlpool

Serpent

RSA

3DES

ECDH

DSA

NTLM

ECDSA

ECC

Answer explanation

REDD fishES

RSA/DSA/ECC/DH - A

All fish/AES/DES/Serpent/CAST

6.

MATCH QUESTION

3 mins • 1 pt

Match the following attack types.

BlueJacking

attack that involves unauthorized access to a device's data, such as contacts, calendars, emails, and other stored information.

BlueSnarfing

exploits vulnerabilities in the Bluetooth protocol to gain control over the targeted device allowing unauthorized monitoring and control features.

BlueBugging

attacker sends unsolicited messages or business cards to Bluetooth-enabled devices within range, typically appearing as pop-up messages on a device.