What is an insider threat?
What is an insider threat?A . A threat posed by an individual with authorized access to an organization's systems and data.B . A vulnerability in an organization's network infrastructure.C . The accidental disclosure of sensitive information.D . A security breach caused by an external attacker.View AnswerAnswer: A Explanation: Insider threats...
Which of the following involves dividing a network into smaller, more manageable segments?
Which of the following involves dividing a network into smaller, more manageable segments?A . DHCP configurationB . IP addressingC . VLAN configurationD . SubnettingView AnswerAnswer: D Explanation: Subnetting is the process of dividing a network into smaller subnetworks, called subnets or subnetworks. It helps in improving network performance, optimizing address...
What is the primary function of a server in a network infrastructure?
What is the primary function of a server in a network infrastructure?A . Monitor network trafficB . Filter incoming and outgoing trafficC . Detect and prevent intrusionsD . Store and manage filesView AnswerAnswer: D Explanation: A server is a computer or system that is dedicated to serving the needs of...
Which of the following is a principle of data security?
Which of the following is a principle of data security?A . EncryptionB . FirewallC . Intrusion Detection SystemD . Data MaskingView AnswerAnswer: A Explanation: Option 1: Correct. Encryption is a principle of data security that involves converting data into a form that is unreadable by unauthorized users. This helps protect...
Which of the following protocols can be used to securely transfer files over a network?
Which of the following protocols can be used to securely transfer files over a network?A . HTTPB . FTPC . SMTPD . DNSView AnswerAnswer: B Explanation: Option 1: Incorrect. HTTP is a protocol for transferring hypertext documents, not files. Option 2: Correct. FTP (File Transfer Protocol) is a protocol used...
Which of the following is true regarding the incident response process?
Which of the following is true regarding the incident response process?A . It is a reactive process that is only initiated after an incident has occurred.B . It is a proactive process that focuses on preventing incidents from occurring.C . It is an iterative process that involves continuous improvement based...
Which of the following is a common security threat that targets web applications?
Which of the following is a common security threat that targets web applications?A . SQL injectionB . DNS poisoningC . Man-in-the-middle attackD . Distributed Denial of Service (DDoS)View AnswerAnswer: A Explanation: Option 1: Correct: SQL injection is a common security threat that targets web applications. It involves inserting malicious SQL...
Which of the following is a best practice for implementing strong password policies within an organization?
Which of the following is a best practice for implementing strong password policies within an organization?A . Allowing users to choose their own passwords, regardless of complexityB . Requiring users to change their password every 90 daysC . Storing passwords in clear text in a central databaseD . Allowing users...
What is the general motivation behind an Advanced Persistent Threat (APT)?
What is the general motivation behind an Advanced Persistent Threat (APT)?A . PublicityB . Random disruptionC . Financial gainD . RevengeView AnswerAnswer: C Explanation: The general motivation behind an APT is often financial gain. Threat actors conducting APTs aim to gain unauthorized access to valuable information, such as financial data...
Which encryption method is used to secure data while it is being actively used and processed by an application?
Which encryption method is used to secure data while it is being actively used and processed by an application?A . Asymmetric encryptionB . Homomorphic encryptionC . Secure Sockets Layer (SSL)D . Hash encryptionView AnswerAnswer: B Explanation: Homomorphic encryption is a form of encryption that allows computations to be performed on...