A ____________ analysis identifies potential impacts that threaten an organization and provides a framework for building resilience.

  • Business Impact
  • Risk
  • Threat
  • Vulnerability
A Business Impact Analysis (BIA) is a systematic process that identifies potential impacts on an organization's operations during disruptive events. It assesses the consequences of such events and provides a framework for building resilience by prioritizing critical functions and resources. Conducting a BIA is essential for effective risk management and developing strategies to mitigate the impact of potential threats.__________________________________________________

____________ authentication uses something the user knows, such as a password or PIN.

  • Biometric
  • Knowledge
  • Multi-factor
  • Two-factor
Knowledge-based authentication relies on something the user knows, like a password or PIN. It's a single-factor authentication method that, despite its simplicity, is susceptible to risks such as password breaches. Recognizing the limitations and potential vulnerabilities of this authentication type is crucial for implementing robust security measures.__________________________________________________

During an audit, it's found that a vendor's sub-contractor has access to sensitive data without proper security measures. This exemplifies ____________ risk.

  • Legal
  • Operational
  • Reputational
  • Third-Party Security
The situation describes a security risk associated with a third-party vendor. The lack of proper security measures for sensitive data within a vendor's sub-contractor represents a third-party security risk. Identifying and mitigating such risks are essential components of effective vendor risk management, ensuring the security of sensitive information throughout the supply chain. Understanding third-party security risks is critical for maintaining robust cybersecurity measures.__________________________________________________

Which type of Threat Intelligence focuses on broad, long-term strategic insights about threats and their actors?

  • Operational Threat Intelligence
  • Strategic Threat Intelligence
  • Tactical Threat Intelligence
  • Technical Threat Intelligence
Strategic Threat Intelligence focuses on broad, long-term insights about threats and their actors. It provides a high-level view of the cybersecurity landscape, helping organizations make informed decisions about their overall security strategy. Distinguishing between different types of threat intelligence is essential for tailoring security measures to specific needs and priorities.__________________________________________________

A company integrates a new technology and updates its security policy to include guidelines for this technology. This demonstrates the principle of ____________ in policy development.

  • Continuous Monitoring
  • Least Privilege
  • Risk Management
  • Security by Design
Integrating security guidelines for a new technology in the policy aligns with the principle of "Security by Design." This approach ensures that security considerations are an integral part of the development and integration process, enhancing overall cybersecurity. Recognizing the importance of Security by Design is critical for organizations adopting new technologies to maintain a proactive and secure posture in their policies.__________________________________________________

____________ is a network protocol used for automating the configuration of IP networks, including routing decisions.

  • BGP
  • DHCP
  • OSPF
  • SNMP
Dynamic Host Configuration Protocol (DHCP) is a network protocol used for automating the configuration of IP networks. It dynamically assigns IP addresses and provides essential network configuration information to devices, simplifying network management. Understanding DHCP is crucial for efficient IP address allocation and network automation in complex environments.__________________________________________________

After clicking on a link in an email, an employee's computer becomes infected with malware that encrypts files and demands payment for their release. This incident is an example of a ____________ attack.

  • Cross-Site Scripting (XSS) Attack
  • Malware Injection Attack
  • Man-in-the-Middle (MitM) Attack
  • Ransomware Attack
A ransomware attack involves the encryption of files on a victim's computer, rendering them inaccessible. Attackers then demand payment (usually in cryptocurrency) for the decryption key. Understanding the characteristics of ransomware attacks is crucial for implementing robust cybersecurity measures to prevent, detect, and respond to such incidents and protect sensitive data from unauthorized encryption.__________________________________________________

What does a 'port scan' in network security primarily aim to identify?

  • DNS configurations
  • MAC addresses
  • Network latency
  • Open ports and services
A 'port scan' in network security primarily aims to identify open ports and services on a system or network. By scanning for open ports, attackers can discover potential entry points for unauthorized access. Understanding the purpose of port scanning is vital for implementing effective security measures to protect against unauthorized access and potential security breaches.__________________________________________________

Which cloud security technology provides isolated execution environments to protect sensitive operations?

  • Containerization (e.g., Docker)
  • Hardware Security Module (HSM)
  • Secure Sockets Layer (SSL)
  • Virtual Private Network (VPN)
Containerization technology, such as Docker, provides isolated execution environments for applications. It enhances security by isolating processes and dependencies. Understanding containerization's role in protecting sensitive operations is essential for securing cloud-based applications and preventing security breaches.__________________________________________________

What is the significance of 'Threat Attribution' in advanced Threat Intelligence practices?

  • Encrypting sensitive data during transmission
  • Identifying and assigning responsibility for cyber attacks
  • Implementing multi-factor authentication
  • Monitoring network traffic for anomalies
Threat Attribution is the process of identifying and assigning responsibility for cyber attacks. It helps in understanding the motives and actors behind threats, enabling organizations to better defend against specific adversaries. This practice is significant in advanced Threat Intelligence, providing insights that go beyond generic threat information and allowing for more targeted and effective security measures.__________________________________________________

____________ is a key feature of SIEM that involves detecting patterns and anomalies in data.

  • Access Control
  • Behavioral Analysis
  • Encryption
  • Intrusion Prevention
Behavioral analysis is a crucial feature of SIEM (Security Information and Event Management) systems. It involves detecting patterns and anomalies in data that may indicate unusual or suspicious behavior. This capability enhances the ability to identify potential security threats and incidents. Understanding the role of behavioral analysis is essential for leveraging the full capabilities of SIEM solutions in enhancing cybersecurity.__________________________________________________

____________ is a technique used in mobile apps to securely transmit data over untrusted networks.

  • Encryption
  • Intrusion Prevention System (IPS)
  • Multi-Factor Authentication (MFA)
  • Secure Sockets Layer (SSL)
Encryption is a security technique that transforms data into a secure format during transmission, making it unreadable without the appropriate decryption key. In mobile apps, encryption is crucial for securely transmitting sensitive data over untrusted networks, safeguarding information from unauthorized access. Understanding encryption is fundamental for implementing robust data protection measures in mobile app development.__________________________________________________