π Cyber Fundamentals
University-level cybersecurity knowledge with exam-style questions and detailed explanations
π Network Security
π Exam Questions
Q1: A security analyst notices that an internal host is making thousands of DNS TXT record queries to an unusual domain. Which attack is MOST likely occurring?
Q2: Which firewall type maintains a state table tracking active connections and can distinguish between new and established traffic?
π Cryptography
π Exam Questions
Q1: An organization needs to ensure that even if their long-term TLS private key is compromised, previously captured encrypted traffic cannot be decrypted. Which property must the key exchange provide?
Q2: A developer stores user passwords using SHA-256 without a salt. What is the PRIMARY vulnerability of this approach?
π¦ Malware Analysis
π Exam Questions
Q1: A malware analyst discovers that a suspicious executable checks for the registry key "HKLM\SOFTWARE\VMware, Inc.\VMware Tools" before executing its payload. What anti-analysis technique is being used?
Q2: According to the Pyramid of Pain, which IOC type causes the MOST difficulty for an attacker to change?
π Identity & Access Management
π Exam Questions
Q1: An employee uses a fingerprint scan and a smart card to access a secure facility. How many authentication factors are being used?
Q2: In a Zero Trust architecture, which statement BEST describes the core principle?
π¨ Incident Response
π Exam Questions
Q1: During an active ransomware incident, a security analyst's FIRST priority should be to:
Q2: When collecting digital evidence from a running system, which should be collected FIRST based on order of volatility?
π Web Application Security
π Exam Questions
Q1: A web application directly concatenates
user input into SQL queries:
SELECT * FROM users WHERE id = '" + userInput + "'. What is the MOST effective remediation?
Q2: Which HTTP header instructs the browser to ONLY connect to a website via HTTPS for a specified duration?