Insider threats can be categorized into malicious and _______. What fills the blank?

  • Accidental
  • Deliberate
  • External
  • Unintentional
Insider threats can be categorized into malicious (deliberate) and accidental. Malicious insiders intentionally harm the organization, while accidental insiders do so without intent, often due to negligence or lack of awareness.

Heuristic analysis in the context of malware detection refers to what?

  • Identifying new, unknown threats based on behavior
  • Scanning for known viruses and malware
  • Conducting penetration testing on network security
  • Analyzing network traffic for performance issues
Heuristic analysis (option 1) involves identifying new, unknown threats based on their behavior rather than relying solely on known virus definitions. It helps detect and mitigate previously unidentified malware and suspicious activities by analyzing patterns and behaviors.

Which term describes the process of testing patches on non-critical systems before a full-scale rollout?

  • Hotfix deployment
  • Shadow IT
  • Staging
  • Zero-day mitigation
The process of testing patches on non-critical systems before a full-scale rollout is called "staging." During staging, patches are applied to a limited number of systems or environments to ensure they do not cause issues before wider deployment.

Which regulation focuses specifically on the protection and confidential handling of health information in the United States?

  • COPPA
  • FERPA
  • GDPR
  • HIPAA
HIPAA (Health Insurance Portability and Accountability Act) focuses specifically on the protection and confidential handling of health information in the United States. It regulates the use and disclosure of individuals' health information by healthcare providers, health plans, and healthcare clearinghouses, among others.

Security awareness training often includes real-world simulations of _______ to test employees' reactions.

  • Attacks
  • Guidelines
  • Hardware
  • Policies
Security awareness training often includes real-world simulations of attacks to test employees' reactions. These simulations help employees practice responding to security incidents and identifying potential threats.

Regularly scheduled backups that only capture the data that has changed since the last full backup are known as what?

  • Differential Backups
  • Full Backups
  • Incremental Backups
  • Mirror Backups
Incremental Backups capture only the data that has changed since the last backup, whether it was a full backup or a previous incremental backup. This reduces the backup time and storage space needed.

_______ provides a way to ensure the integrity of data stored on disk by verifying that it hasn't been tampered with.

  • Firewall
  • Hashing
  • Proxy
  • RAID
Hashing provides data integrity by producing a fixed-size hash value (digest) based on the content of the data. If the data changes, the hash value will also change, making it easy to detect any tampering or corruption.

Jane, a network administrator, notices that a server's SSL certificate has expired. If the certificate isn't renewed, what could be a potential impact on the server's users?

  • Users will experience SSL errors while connecting to the server.
  • Users will have slower internet access.
  • Users will lose access to the server.
  • Users will need to update their passwords.
An expired SSL certificate will result in SSL errors, which can disrupt secure connections, leading to a loss of trust and potential security risks for the server's users.

After a major data breach, a company mandates that employees use their passwords, a smart card, and a biometric scan to access the company's systems. This security measure is an example of which authentication method?

  • Biometric Authentication
  • Multi-Factor Authentication (MFA)
  • Single Sign-On (SSO)
  • Two-Factor Authentication (2FA)
This security measure is an example of "Multi-Factor Authentication (MFA)." MFA requires users to provide two or more authentication factors (in this case, a password, a smart card, and a biometric scan) to gain access, making it more secure than single-factor authentication.

Which of the following best describes the concept of "role-based access control"?

  • Access control is not enforced
  • All users have equal access to all resources
  • Users are authenticated using biometrics
  • Users are grouped based on job roles, and permissions are assigned accordingly
Role-based access control (RBAC) is a concept in which users are grouped based on their job roles, and permissions are assigned accordingly. This approach simplifies access control by granting or restricting access based on job responsibilities, ensuring that users only have access to resources essential for their roles, which enhances security and administrative efficiency.

Which authentication method involves something the user physically possesses, like a smart card or token?

  • Biometric authentication
  • Two-factor authentication
  • Password authentication
  • Single-factor authentication
Two-factor authentication (2FA) involves something the user physically possesses (like a smart card or token) and something they know (like a PIN or password). It provides an additional layer of security beyond just a password, making it more challenging for unauthorized users to gain access.

Multi-factor authentication typically involves how many different forms of evidence (or factors) for verifying a user's identity?

  • Four factors
  • One factor
  • Three factors
  • Two factors
Multi-factor authentication typically involves two or more different forms of evidence (factors) for verifying a user's identity. These factors can include something the user knows (password), something the user has (smart card or mobile device), and something the user is (biometric data like fingerprints).