Which of the following protocols uses TLS/SSL to ensure secure transmission of data over the Internet?
Answer : A
HTTPS (Hypertext Transfer Protocol Secure) is a protocol that uses TLS/SSL to ensure secure transmission of data over the Internet. HTTPS is an extension of HTTP, which is the standard protocol for transferring data between web servers and browsers. HTTPS encrypts the data exchanged between the client and the server, preventing anyone from intercepting, modifying, or stealing the data. HTTPS also verifies the identity of the server using digital certificates, preventing spoofing or phishing attacks. HTTPS is widely used for web applications that handle sensitive information, such as online banking, e-commerce, or social media. Reference:
HTTPS - Week 7: Email Security
How does SSL work? | SSL certificates and TLS | Cloudflare
SSL and TLS: A Beginners Guide | SANS Institute
Stella, a mobile user, often ignores the messages received from the manufacturer for updates. One day, she found that files in her device are being replaced, she immediately rushed to the nearest service center for inquiry. They tested the device and identified vulnerabilities in it as it ran with an obsolete OS version.
Identify the mobile device security risk raised on Stella's device in the above scenario.
Answer : B
System-based risk is a type of mobile device security risk that arises from the vulnerabilities or flaws in the operating system or firmware of the device. System-based risk can expose the device to malware, spyware, ransomware, or other malicious attacks that can compromise the data, functionality, or privacy of the device. System-based risk can be mitigated by applying regular security updates and patches from the manufacturer or vendor, as well as using antivirus or anti-malware software. In the above scenario, Stella's device faced a system-based risk, as it ran with an obsolete OS version that had vulnerabilities that allowed the files to be replaced. She ignored the messages from the manufacturer for updates, which could have prevented the risk. Reference:
Mobile Device Security Risks - Week 8: Mobile Device Security
Is It Safe to Use an Old or Used Phone? Here's What You Should Know
Obsolete products - The National Cyber Security Centre
Which of the following actors in the NIST cloud deployment reference architecture acts as an intermediary for providing connectivity and transport services between cloud consumers and providers?
Answer : D
Mary was surfing the Internet, and she wanted to hide her details and the content she was surfing over the web. She employed a proxy tool that makes his online activity untraceable.
Identify the type of proxy employed by John in the above scenario.
Answer : B
anonymous proxy is a type of proxy that hides the user's IP address and other identifying information from the web servers they access. An anonymous proxy acts as an intermediary between the user and the internet, and it modifies the HTTP headers to prevent the web servers from tracking the user's location, browser, or device. An anonymous proxy can help the user bypass geo-restrictions, censorship, and online surveillance. However, an anonymous proxy does not encrypt the user's traffic, and it may still leak some information to the proxy provider or other third parties. An anonymous proxy is the type of proxy employed by Mary in the above scenario, as she used a proxy tool that makes her online activity untraceable. Reference:
What is a Proxy Server and How Does it Work?
13 Best Proxy Tools for PC [2024 Reviewed] - Section: Anonymous proxies
Joseph, a cloud administrator, was recruited for the management and deployment of the software
containers. As part of his job, Joseph employed an automated solution that converts images into containers, deploys them to the hosts, and further monitors container workflow from a single location.
Identify the solution employed by Joseph in the above scenario.
Answer : B
Orchestrators are tools that automate container deployment, administration, and scaling tasks. They allow you to reliably manage fleets of hundreds or thousands of containers in production environments. Orchestrators simplify container admin by letting you think in terms of application components instead of individual containers. They're able to take control of all your app's requirements, including config values, secrets, and network services. Orchestrators are the solution employed by Joseph in the above scenario, as he used an automated solution that converts images into containers, deploys them to the hosts, and further monitors container workflow from a single location. Reference:
13 Most Useful Container Orchestration Tools in 2024 - Spacelift
Network Defense Essentials - CERT - EC-Council - Module 6: Virtualization and Cloud Computing
James was recruited as security personnel in an organization and was instructed to secure the organization's infrastructure from physical threats. To achieve this, James installed CCTV systems near gates, reception, hallways, and workplaces to capture illicit activities inside the premises, identify activities that need attention, collect images as evidence, and aid in an alarm system.
Identify the type of physical security control implemented by James in the above scenario.
Answer : A
Jamie wants to send a confidential file to her friend Alice. For this purpose, they installed an application for securely sharing the file. The application employs an encryption algorithm that uses the same shared secret key for encryption and decryption of data.
Identify the type of cryptography employed by the application used by Alice and Jamie for file sharing.
Answer : A