Incentro Cyber Security 26-01-2022

1 / 58
next
Slide 1: Slide
quizBasisschoolGroep 1

This lesson contains 58 slides, with interactive quizzes and text slides.

Items in this lesson

Slide 1 - Slide

Slide 2 - Slide

Slide 3 - Slide

Slide 4 - Slide

Slide 5 - Slide

Slide 6 - Slide

Slide 7 - Slide

Slide 8 - Slide

Slide 9 - Slide

Slide 10 - Slide

Slide 11 - Slide

Slide 12 - Slide

Slide 13 - Slide

Slide 14 - Slide

Spoofing a WiFi Access point is also called?
A
An evil twin attack
B
Pineapple attack
C
A keystroke Injection
D
Nmap scan Attack

Slide 15 - Quiz

Slide 16 - Slide

Slide 17 - Slide

HTTPS is helpful for?
A
For preventing CSRF attacks
B
For preventing XSS attacks
C
For preventing SQL injections
D
For preventing Sniffing attacks

Slide 18 - Quiz

Slide 19 - Slide

Slide 20 - Slide

Slide 21 - Slide

Which statement is true?
A
REST APIs should deny access by default, except public resources
B
JWT tokens can manually be invalidated
C
The following header is valid, “Access-Control-Alllow-origin: https://*.website.com”
D
Limit the rate of API access does not minimize the harm from automated attack tooling

Slide 22 - Quiz

Slide 23 - Slide

Slide 24 - Slide

Slide 25 - Slide

To prevent an CSRF attack, an web application should?
A
Make sure that POST, PUT, PATCH & DELETE calls are idempotent
B
Transmit the CSRF token by only using cookies
C
Generate the CSRF token on the service-side and require a custom-HTTP-header per request
D
Only permit HTTPS requests

Slide 26 - Quiz

Slide 27 - Slide

Slide 28 - Slide

Slide 29 - Slide

The best way to store passwords is by
A
Make sure that POST, PUT, PATCH & DELETE calls are idempotent
B
Transmit the CSRF token by only using cookies
C
Generate the CSRF token on the service-side and require a custom-HTTP-header per request
D
Only permit HTTPS requests

Slide 30 - Quiz

Slide 31 - Slide

Slide 32 - Slide

Slide 33 - Slide

Which statement is true?
A
By using the AES-256 encryption.
B
By using the slow Argon2id hashing.
C
By using base64 encoding.
D
By using the fast SHA-1 hashing.

Slide 34 - Quiz

Slide 35 - Slide

Slide 36 - Slide

Slide 37 - Slide

Which statement is true :)?
A
To analyse vulnerabilities in the node modules you can use npm audit.
B
Always specify a USER when creating Docker files
C
To analyse vulnerabilities in for the maven dependencies you can use the owasp dependency check maven
D
All of the above :)

Slide 38 - Quiz

Slide 39 - Slide

Slide 40 - Slide

CIA in IT Security means what?
A
Central Intelligence Agency
B
Confidentiality, Integrity and Availability
C
Continuity, Integrity and Accessibility
D
Continuity, Integration and Availability

Slide 41 - Quiz

Slide 42 - Slide

Slide 43 - Slide

Slide 44 - Slide

What is 'Alpine'?
A
Adventurous form of skiing
B
Open Source Security Tool by Google
C
Linux distribution
D
City in Wyoming, USA

Slide 45 - Quiz

Slide 46 - Slide

Slide 47 - Slide

Slide 48 - Slide

Which of the following is the most secure password option?
A
x509 certificate
B
Welkom2007
C
t:u7?3H%>-3tH(e3SksNr.b#
D
pointed-silica-womb-garden

Slide 49 - Quiz

Slide 50 - Slide

Slide 51 - Slide

Slide 52 - Slide

Within how much time after public disclosure did GCP Cloud Armor provide protection against Log4J2?
A
Direct at public disclosure
B
Within 24 hours
C
Within 7 days
D
Still no protection

Slide 53 - Quiz

Slide 54 - Slide

Slide 55 - Slide

Slide 56 - Slide

Slide 57 - Slide

Slide 58 - Slide