Explain the purpose of a smart card in access control. A smart card in access control serves as a secure
How does biometric authentication enhance identity and access management? Biometric authentication enhances identity and access management (IAM) by providing
Define the term "least privilege" in the context of access controls. In the context of access controls, the principle of "
Describe the impact of a man-in-the-middle (MitM) attack on network security. A Man-in-the-Middle (MitM) attack is a type of cyberattack where
Explain the concept of privilege escalation in cyber attacks. Privilege escalation in the context of cyber attacks refers to
What is the role of a penetration tester in cybersecurity? A penetration tester, also known as an ethical hacker or
How does ransomware work, and what steps can be taken to prevent it? Ransomware is a type of malicious software that encrypts a
Define the term "phishing" and describe common phishing techniques. Phishing is a cyber-attack method in which attackers use deceptive
What is the purpose of a social engineering attack, and how can it be prevented? Social engineering is a type of cyberattack that relies on
Differentiate between active and passive reconnaissance in cyber attacks. Active and passive reconnaissance are two distinct approaches used in