Which type of encryption protects data while it is being transmitted over a network?
Which type of encryption protects data while it is being transmitted over a network?A . Transport Layer Security (TLS)B . Asymmetric encryptionC . Symmetric encryptionD . Hash encryptionView AnswerAnswer: A Explanation: Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication over a network. It ensures the confidentiality...
Which of the following is a common security control measure used to protect applications from unauthorized access?
Which of the following is a common security control measure used to protect applications from unauthorized access?A . File compressionB . Biometric authenticationC . Hard disk formattingD . Data anonymizationView AnswerAnswer: B Explanation: Biometric authentication is a security control measure that uses physical or behavioral characteristics, such as fingerprint scanning...
What type of encryption is used to secure data that is stored on a hard drive or other storage media?
What type of encryption is used to secure data that is stored on a hard drive or other storage media?A . File-based encryptionB . Hash encryptionC . Symmetric encryptionD . Public Key Infrastructure (PKI)View AnswerAnswer: C Explanation: Symmetric encryption is a type of encryption where the same key is used...
What is the purpose of using an application firewall in a cybersecurity setup?
What is the purpose of using an application firewall in a cybersecurity setup?A . To encrypt network traffic between applicationsB . To perform vulnerability scanning of applicationsC . To increase the speed and performance of applicationsD . To block malicious incoming requests and attacks aimed at the applicationView AnswerAnswer: D...
What is an Advanced Persistent Threat (APT)?
What is an Advanced Persistent Threat (APT)?A . A vulnerability in network communication protocols.B . A cyberattack that compromises multiple devices simultaneously.C . A sophisticated and targeted attack that aims to gain unauthorized access and maintain persistence over a long period.D . A type of malware that spreads rapidly through...
Which of the following is a key requirement for conducting a security compliance audit?
Which of the following is a key requirement for conducting a security compliance audit?A . A comprehensive understanding of security compliance standards and regulationsB . A certified auditor with expertise in security complianceC . Compliance monitoring tools and systemsD . A detailed audit plan and checklistView AnswerAnswer: A Explanation: Option...
Which of the following best describes network security?
Which of the following best describes network security?A . Ensuring high availability and performance of the networkB . Securing physical access to network devicesC . Protecting data from unauthorized access or modificationsD . Preventing network configuration errorsView AnswerAnswer: C Explanation: Network security is the practice of protecting data in a...
What is the purpose of Security Information and Event Management (SIEM) systems?
What is the purpose of Security Information and Event Management (SIEM) systems?A . To analyze network traffic and detect potential security threats.B . To centrally collect, store, and analyze logs from various systems to detect and respond to security incidents.C . To encrypt sensitive data to protect it from unauthorized...
What is a denial of service (DoS) attack?
What is a denial of service (DoS) attack?A . A technique used by attackers to obtain sensitive information through deception.B . A software program that is designed to damage, disrupt, or gain unauthorized access to a computer system.C . A form of cyber attack that attempts to gain unauthorized access...
Which of the following is a best practice for managing security policies and procedures?
Which of the following is a best practice for managing security policies and procedures?A . Implementing a regular review process for security policiesB . Relying solely on default security settingsC . Allowing users to create and manage their own security policiesD . Not documenting the security policies and proceduresView AnswerAnswer:...