An IDS that actively takes actions, such as blocking traffic or terminating sessions, when a threat is detected is referred to as _______.

  • Firewall
  • Honeypot
  • Intrusion Prevention System
  • Router
An Intrusion Prevention System (IPS) is an IDS that not only detects threats but also takes proactive measures to block or prevent them.

An organization's detailed step-by-step approach to handle and report a security breach is known as what?

  • Cybersecurity Awareness Program
  • Incident Response Plan
  • Server Configuration
  • System Patch Management
An organization's detailed step-by-step approach to handle and report a security breach is known as an Incident Response Plan. It outlines the actions to take when a security incident occurs, helping mitigate potential damage and protect the organization.

After detecting a potential security incident on a mobile device, what is the first step an employee should typically take, as per standard reporting procedures?

  • Attempt to resolve the incident independently
  • Continue using the device as usual
  • Disconnect from the network
  • Immediately report it to the organization's IT or security team
The first step an employee should take upon detecting a potential security incident on a mobile device is to immediately report it to the organization's IT or security team. This ensures that the incident is addressed promptly and the necessary steps are taken to mitigate any potential risks.

The process of allowing certain traffic to bypass the usual security inspection based on specific criteria is known as firewall _______.

  • Bypass
  • Exception
  • Exemption
  • Whitelisting
Firewall 'Exception' allows specific traffic to bypass regular security inspection, based on predefined criteria or exceptions.

Jane, a network administrator, notices that a server's SSL certificate has expired. If the certificate isn't renewed, what could be a potential impact on the server's users?

  • Users will experience SSL errors while connecting to the server.
  • Users will have slower internet access.
  • Users will lose access to the server.
  • Users will need to update their passwords.
An expired SSL certificate will result in SSL errors, which can disrupt secure connections, leading to a loss of trust and potential security risks for the server's users.

_______ provides a way to ensure the integrity of data stored on disk by verifying that it hasn't been tampered with.

  • Firewall
  • Hashing
  • Proxy
  • RAID
Hashing provides data integrity by producing a fixed-size hash value (digest) based on the content of the data. If the data changes, the hash value will also change, making it easy to detect any tampering or corruption.

Regularly scheduled backups that only capture the data that has changed since the last full backup are known as what?

  • Differential Backups
  • Full Backups
  • Incremental Backups
  • Mirror Backups
Incremental Backups capture only the data that has changed since the last backup, whether it was a full backup or a previous incremental backup. This reduces the backup time and storage space needed.

Security awareness training often includes real-world simulations of _______ to test employees' reactions.

  • Attacks
  • Guidelines
  • Hardware
  • Policies
Security awareness training often includes real-world simulations of attacks to test employees' reactions. These simulations help employees practice responding to security incidents and identifying potential threats.

Which regulation focuses specifically on the protection and confidential handling of health information in the United States?

  • COPPA
  • FERPA
  • GDPR
  • HIPAA
HIPAA (Health Insurance Portability and Accountability Act) focuses specifically on the protection and confidential handling of health information in the United States. It regulates the use and disclosure of individuals' health information by healthcare providers, health plans, and healthcare clearinghouses, among others.

Which term describes the process of testing patches on non-critical systems before a full-scale rollout?

  • Hotfix deployment
  • Shadow IT
  • Staging
  • Zero-day mitigation
The process of testing patches on non-critical systems before a full-scale rollout is called "staging." During staging, patches are applied to a limited number of systems or environments to ensure they do not cause issues before wider deployment.