____________ is a firewall configuration approach that denies all traffic unless explicitly allowed.

  • Default Deny
  • Packet Filtering
  • Proxy Firewall
  • Stateful Inspection
Default Deny is a firewall configuration approach that blocks all incoming and outgoing traffic by default. Only explicitly allowed traffic is permitted. This enhances security by reducing the attack surface and preventing unauthorized access unless specifically granted. Understanding this approach is crucial for effective firewall management and network protection.__________________________________________________

A ____________ approach in API security involves verifying the identity of both the user and the application.

  • Least Privilege Principle
  • Role-Based Access Control (RBAC)
  • Single Sign-On (SSO)
  • Zero Trust
A Zero Trust approach in API security requires verifying the identity of both the user and the application, regardless of their location or network. This security model assumes that no entity, whether inside or outside the network, should be trusted by default. Adopting a Zero Trust approach is vital for minimizing the risk of unauthorized access and ensuring a robust authentication process in API transactions.__________________________________________________

A cyber attack caused data loss in a multinational company, but its operations were not significantly hindered due to effective ____________ strategies.

  • Backup and Data Recovery
  • Encryption
  • Incident Response
  • Network Segmentation
Effective incident response strategies played a crucial role in minimizing the impact of the cyber attack. Incident response involves detecting, responding to, and recovering from cybersecurity incidents promptly. In this context, the company's ability to continue operations despite data loss underscores the importance of a robust incident response plan, including measures for data recovery and mitigation of potential damages.__________________________________________________

____________ is a network security model that categorizes network segments based on function and security needs.

  • Defense in Depth
  • Honeypot
  • Least Privilege
  • Zero Trust
Zero Trust is a network security model that categorizes network segments based on function and security needs. It assumes that no entity, whether inside or outside the network, should be trusted by default. Implementing Zero Trust principles helps enhance security by validating every user and device, reducing the risk of unauthorized access and potential security breaches.__________________________________________________

Secure coding practices recommend using ____________ to manage and store secrets like API keys and passwords.

  • Encryption
  • Hashing
  • Key Management
  • Secure Vaults
Secure coding practices advise using robust key management systems to safeguard sensitive information such as API keys and passwords. Proper key management involves secure storage, rotation, and access control, enhancing the overall security posture of an application or system.__________________________________________________

A ____________ VPN allows remote users to access a network securely over the internet.

  • Extranet
  • Intranet
  • Remote Access
  • Site-to-Site
A Remote Access VPN allows individual users to securely connect to a private network over the internet. It provides a secure tunnel for remote users to access resources as if they were directly connected to the internal network. Familiarity with the different types of VPNs is crucial for implementing the appropriate solution based on specific network requirements.__________________________________________________

What is the primary goal of Business Continuity Management (BCM)?

  • Enhance employee morale
  • Ensure the organization's resilience to disruptions
  • Improve customer satisfaction
  • Maximize profit
The primary goal of Business Continuity Management (BCM) is to ensure the organization's resilience to disruptions. BCM focuses on developing strategies and plans to maintain essential business functions during and after emergencies. This helps organizations minimize downtime and recover quickly, safeguarding their long-term viability. Understanding this goal is fundamental for effective BCM implementation.__________________________________________________

In a network, what is the main function of a router?

  • Encrypt data transmission
  • Facilitate the transmission of data between different networks
  • Filter and forward data packets
  • Manage user authentication
A router's primary function is to filter and forward data packets between different networks. It operates at the network layer of the OSI model and makes decisions based on routing tables. Understanding the role of routers is essential for effective network communication and the establishment of secure and efficient data paths between devices in diverse networks.__________________________________________________

What does the term 'subnetting' refer to in network architecture?

  • Dividing a large network into smaller, more manageable sub-networks
  • Encrypting data transmission
  • Filtering and blocking malicious traffic
  • Managing user authentication
Subnetting involves dividing a large network into smaller, more manageable sub-networks. It helps improve network performance, security, and management. Understanding subnetting is crucial for network administrators to optimize IP address allocation and efficiently organize resources within a network infrastructure.__________________________________________________

AI can improve ____________ management by automatically identifying and prioritizing risks.

  • Access
  • Identity
  • Incident
  • Risk
AI has the capability to enhance risk management in cybersecurity by automatically identifying and prioritizing risks. Through advanced analytics and automation, AI systems can analyze vast amounts of data to identify potential risks and vulnerabilities, allowing organizations to focus on addressing the most critical threats. Understanding the role of AI in risk management is essential for effective cybersecurity strategies.__________________________________________________

What does an automated Security Information and Event Management (SIEM) system primarily do?

  • Authenticate users based on biometrics
  • Block malicious websites
  • Collect, analyze, and correlate logs
  • Encrypt network traffic
An automated Security Information and Event Management (SIEM) system primarily collects, analyzes, and correlates logs from various sources across an organization's IT infrastructure. By monitoring and analyzing security events, a SIEM system helps identify potential threats and security incidents. Understanding the functionality of SIEM is critical for effective threat detection and incident response in cybersecurity operations.__________________________________________________

Which method of data analysis is commonly used in Threat Intelligence for identifying patterns and anomalies?

  • Behavioral Analysis
  • Heuristic Analysis
  • Predictive Analysis
  • Statistical Analysis
In Threat Intelligence, statistical analysis is commonly employed to identify patterns and anomalies. This method involves analyzing data to uncover trends, correlations, and outliers, providing valuable insights into potential threats. Understanding the significance of statistical analysis is crucial for effective threat detection and response in the rapidly evolving landscape of cybersecurity.__________________________________________________