The ____________ principle in cybersecurity suggests that systems should default to secure states in the event of a failure.

  • Defense in Depth
  • Fail-Safe
  • Least Privilege
  • Principle of Least Astonishment
The fail-safe principle in cybersecurity advocates that systems should default to secure states when there is a failure or unexpected event. This approach helps minimize potential vulnerabilities and ensures that even in adverse conditions, systems maintain a secure posture. Familiarity with the fail-safe principle is essential for designing resilient and secure systems in the face of unexpected failures.__________________________________________________

In BCM, how is 'supply chain continuity' managed for critical business operations?

  • Establishes alternate suppliers and diversifies supply sources
  • Focuses solely on internal production capabilities
  • Relies on insurance coverage for supply chain disruptions
  • Shifts the entire supply chain to a single vendor
Managing supply chain continuity in Business Continuity Management (BCM) involves establishing alternate suppliers, diversifying supply sources, and creating redundancy in the supply chain. This approach helps mitigate the impact of disruptions and ensures the availability of critical resources. Understanding supply chain continuity is essential for organizations to maintain critical business operations even in the face of external disruptions.__________________________________________________

____________ is the practice of protecting sensitive information from unauthorized access or disclosure.

  • Authentication
  • Cybersecurity
  • Encryption
  • Intrusion Detection System
Encryption is the practice of protecting sensitive information by converting it into a secure format that can only be accessed with the appropriate decryption key. It plays a crucial role in safeguarding data confidentiality and integrity, making it a fundamental concept in cybersecurity for protecting information from unauthorized access or disclosure.__________________________________________________

____________ is a crucial ethical consideration, which involves the fair and equal treatment of all data and users.

  • Cybersecurity Integrity
  • Data Equality
  • Data Neutrality
  • Privacy Protection
Data Equality is a crucial ethical consideration in cybersecurity, emphasizing the fair and equal treatment of all data and users. This principle underscores the importance of avoiding discrimination and ensuring unbiased access to information, promoting ethical data practices in the cybersecurity domain.__________________________________________________

____________ access control models permissions around the sensitivity of the information and the user's need to know.

  • Attribute-Based
  • Discretionary
  • Mandatory
  • Role-Based
Attribute-Based Access Control (ABAC) models permissions around the sensitivity of the information and the user's need to know based on attributes. Unlike other access control models, ABAC considers various attributes such as user roles, time of access, and data classification. Understanding ABAC is vital for implementing fine-grained access controls in diverse and dynamic environments.__________________________________________________

Which regulation provides guidelines for data protection and privacy for individuals within the European Union?

  • Family Educational Rights and Privacy Act (FERPA)
  • General Data Protection Regulation (GDPR)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Personal Information Protection and Electronic Documents Act (PIPEDA)
The General Data Protection Regulation (GDPR) is a regulation in EU law that governs data protection and privacy for individuals within the European Union and the European Economic Area. Understanding GDPR is essential for organizations handling EU citizens' data to comply with its stringent guidelines on data processing, storage, and the rights of data subjects.__________________________________________________

Which process is critical for continuous monitoring of third-party vendor risks?

  • Continuous Monitoring
  • Incident Response
  • Risk Management
  • Vendor Performance Evaluation
Continuous Monitoring is critical for ongoing evaluation of third-party vendor risks. This process involves regularly assessing and managing risks associated with vendor relationships. While risk management is a broader concept, continuous monitoring specifically emphasizes the need for real-time awareness to promptly address emerging threats or changes in vendor risk profiles.__________________________________________________

What does an Intrusion Prevention System (IPS) do in addition to the functionalities of an IDS?

  • Blocks or mitigates detected malicious activities
  • Monitors network traffic for anomalies
  • Provides real-time analysis of log files
  • Sends alerts for potential security incidents
An Intrusion Prevention System (IPS) goes beyond the functionalities of an Intrusion Detection System (IDS) by actively blocking or mitigating detected malicious activities. While an IDS focuses on monitoring and alerting, an IPS takes proactive measures to prevent and stop security threats in real-time. Understanding the additional proactive role of an IPS is essential for enhancing network security against evolving cyber threats.__________________________________________________

What is the main difference between IPv4 and IPv6 addressing schemes?

  • IPv4 uses 128-bit addresses
  • IPv4 uses 32-bit addresses
  • IPv6 uses 128-bit addresses
  • IPv6 uses 32-bit addresses
The main difference lies in the address length. IPv4 addresses are 32 bits long, limiting the number of available addresses and leading to address exhaustion. IPv6, on the other hand, uses 128-bit addresses, significantly expanding the address space. This change addresses the limitations of IPv4 and provides a vast number of unique addresses, essential for the growing number of devices connected to the Internet.__________________________________________________

IoT devices often employ ____________ to encrypt data transmitted across networks.

  • AES (Advanced Encryption Standard)
  • RSA (Rivest–Shamir–Adleman)
  • SHA-256 (Secure Hash Algorithm 256-bit)
  • TLS (Transport Layer Security)
TLS (Transport Layer Security) is commonly used to encrypt data transmitted across networks by IoT devices. It ensures secure communication by encrypting the data, making it challenging for unauthorized entities to intercept or tamper with sensitive information. Understanding the role of TLS in IoT security is vital for safeguarding data integrity and confidentiality in IoT deployments.__________________________________________________

____________ is a critical aspect in IoT security, focusing on protecting the device's physical interfaces and hardware.

  • Behavioral Analysis
  • Network Segmentation
  • Physical Security
  • Secure Boot
Physical security in IoT involves safeguarding the device's physical components and interfaces from unauthorized access or tampering. This includes measures such as secure enclosures and tamper-evident seals. Understanding the importance of physical security is vital for building robust IoT systems that defend against both cyber and physical threats to device integrity.__________________________________________________

Which current encryption algorithm is considered potentially vulnerable to quantum computing attacks?

  • AES
  • DES
  • RSA
  • SHA-256
RSA, a widely used public key encryption algorithm, is considered potentially vulnerable to quantum computing attacks. The vulnerability lies in the ability of quantum computers to efficiently perform integer factorization, compromising the security of RSA's key generation. Identifying algorithms susceptible to quantum threats is vital for transitioning to quantum-resistant cryptographic solutions.__________________________________________________