What common practice involves creating a duplicate copy of data to ensure its availability in case of data loss?

  • Data Archiving
  • Data Compression
  • Data Encryption
  • Data Mirroring
Data Mirroring is the practice of creating a duplicate copy of data on another storage device. This is done in real-time or near-real-time to ensure data availability in case of data loss or hardware failure. It provides redundancy and high availability.

In the context of regulations, what does GDPR stand for?

  • General Data Privacy Requirement
  • General Data Protection Requirement
  • Global Data Privacy Regulation
  • Global Data Protection Regulation
GDPR stands for the General Data Protection Regulation, which is a European Union regulation designed to protect the privacy and data of EU citizens. It has global implications for organizations dealing with EU citizens' data.

Which advanced cryptographic protocol allows two parties to securely compute a function over their inputs while keeping those inputs private?

  • DES
  • Diffie-Hellman
  • Homomorphic Encryption
  • RSA
Homomorphic Encryption is an advanced cryptographic technique that allows two parties to perform computations on their encrypted data without revealing the data to each other. This is particularly useful in secure multi-party computation and privacy-preserving data analysis.

An employee loses their personal smartphone, which they also use for work-related tasks. They immediately report the loss to the IT department, which then remotely wipes the device. This action is most likely in accordance with which organizational policy?

  • BYOD Policy
  • Data Retention Policy
  • Mobile Device Management (MDM) Policy
  • Privacy Policy
This action is most likely in accordance with the Mobile Device Management (MDM) Policy. MDM policies often include provisions for remote device wiping to protect sensitive company data when a device is lost or stolen. It allows IT departments to remotely erase company data and applications from the device to prevent data breaches.

In the context of web application security, what is the primary difference between "encoding" and "escaping"?

  • Encoding ensures data integrity, while escaping prevents SQL injection.
  • Encoding is a method for securing APIs, while escaping is used to secure session cookies.
  • Encoding protects against HTML injection, while escaping is used to secure JavaScript.
  • Encoding transforms data into a different format, while escaping makes data safe for use in specific contexts.
Encoding involves changing data into a different format so that it's safe for a particular context, such as converting special characters to HTML entities. Escaping, on the other hand, ensures data is safe for use in specific situations, like preventing SQL injection or cross-site scripting (XSS). The main difference is in their purpose and target use cases.

Why might an organization choose to implement a split-tunneling VPN configuration?

  • To achieve better compatibility with legacy systems
  • To ensure end-to-end encryption
  • To improve security
  • To reduce network bandwidth usage
An organization may choose split-tunneling to conserve bandwidth by not routing all traffic through the VPN. It's a trade-off between security and efficiency.

Under GDPR, individuals have the right to access their personal data and the right to _______ it.

  • Alter the Data
  • Correct the Data
  • Delete the Data
  • Share the Data
Under the General Data Protection Regulation (GDPR), individuals have the right to access their personal data held by organizations. This means they can request to correct or update the data if it's inaccurate. This helps individuals maintain the accuracy of their personal information.

Which of the following best describes the primary purpose of a certificate authority (CA) in the SSL/TLS handshake process?

  • Authenticating users
  • Handling encryption keys
  • Issuing digital certificates
  • Providing web hosting
A Certificate Authority (CA) in the SSL/TLS handshake process primarily issues digital certificates. These certificates are used to verify the authenticity of a website, ensuring that the connection is secure and that data is encrypted.

In an out-of-band SQL injection attack, data is retrieved using:

  • A separate channel
  • API endpoints
  • HTTP GET requests
  • The same channel with UNION statements
In an out-of-band SQL injection, attackers retrieve data via a separate channel, such as a DNS request, rather than through the same channel as the main application.

How does AWS Lambda handle scaling automatically?

  • Based on the incoming traffic and workload
  • By manually adjusting the compute capacity
  • By periodically checking system metrics
  • Through scheduled scaling events
AWS Lambda handles scaling automatically by dynamically adjusting resources based on the incoming traffic and workload, providing efficient and scalable compute capabilities for serverless applications.

The process of hiding a wireless network by not broadcasting its SSID is known as _______.

  • MAC Filtering
  • Network Masking
  • SSID Concealing
  • SSID Encryption
SSID Concealing, also known as SSID hiding, is a security measure where the network name (SSID) is not broadcast, making it less visible to potential attackers.

An encryption system that uses the same key to encrypt and decrypt information is known as _______ encryption.

  • Asymmetric
  • Private
  • Public
  • Symmetric
Symmetric encryption, also known as private-key encryption, uses the same key for both encryption and decryption. This means that the sender and the recipient must both have access to the same secret key. It is typically faster and less computationally intensive compared to asymmetric encryption.