A cloud service provider promises to maintain certain security measures to protect its customer's data. To ensure this, the customer asks for a third-party attestation regarding the provider's security practices. This is an example of seeking which type of assurance?

  • Regulatory compliance assurance
  • Service Level Agreement (SLA) assurance
  • Third-party security assessment
  • Vendor self-assessment assurance
Seeking a third-party security assessment ensures an independent evaluation of the cloud provider's security measures, providing customers with assurance that their data will be adequately protected.

One of the primary components of DLP is _______ detection, which analyzes communication patterns for potential data exfiltration.

  • Anomaly
  • Behavioral
  • Intrusion
  • Malware
One of the primary components of DLP (Data Loss Prevention) is Anomaly detection, which analyzes communication patterns for potential data exfiltration. Anomaly detection looks for unusual patterns that may indicate data breaches or unauthorized access.

Which technology encrypts the entire hard drive, ensuring that the data on the disk is secure even if the computer is lost or stolen?

  • AES
  • BitLocker
  • Firewall
  • TPM
BitLocker is a full-disk encryption feature included with Microsoft Windows. It encrypts the entire hard drive, making it unreadable without the proper decryption key. This ensures the security of data on the disk, even if the computer is lost or stolen.

Which stage of security incident response is focused on eradicating the root cause of the incident?

  • Analysis
  • Containment
  • Identification
  • Recovery
The 'Analysis' stage focuses on identifying the root cause of the incident by examining how the breach occurred. Once the root cause is known, efforts can be directed toward eradicating it and preventing future occurrences.

Which device is typically used to segment a network and control incoming and outgoing network traffic based on security policies?

  • Hub
  • Modem
  • Router
  • Switch
A router is used to segment a network and control network traffic based on security policies by directing traffic between different network segments, effectively acting as a gateway for traffic control.

What is the primary advantage of using a biometric authentication method, such as fingerprint or facial recognition?

  • Easy to Implement
  • High Efficiency
  • Low Cost
  • Strong Security
The primary advantage of biometric authentication methods like fingerprint or facial recognition is their strong security. Biometrics provide a high level of security because they are based on unique physical or behavioral characteristics, making it extremely difficult for unauthorized users to gain access. These methods are challenging to fake or replicate, enhancing security.

After implementing a new firewall rule, a company's remote employees suddenly cannot access the internal network through the VPN. The IT team suspects the rule is blocking the VPN traffic. To address this issue without compromising security, what should they consider adjusting in the firewall?

  • Rule Complexity
  • Rule Logging
  • Rule Priority
  • Rule Timing
Adjusting the 'Rule Priority' allows the company to ensure that the VPN traffic is processed before other rules, resolving the issue without compromising security.

Blind SQL Injection is a type of SQL injection where:

  • Attackers extract data blindly
  • Attackers inject code
  • Attackers manipulate queries
  • Attackers use UNION-based techniques
Blind SQL Injection occurs when attackers blindly extract data from a database without directly knowing the query's result. This is typically done using boolean-based queries.

What is the main reason behind using anti-CSRF tokens in web forms?

  • Avoiding Distributed Denial of Service (DDoS) Attacks
  • Mitigating Cross-Site Scripting Attacks
  • Preventing Data Breaches
  • Protecting Against Cross-Site Request Forgery
Anti-CSRF tokens are primarily used to protect against Cross-Site Request Forgery (CSRF) attacks. These tokens help ensure that requests made to a server are legitimate and not generated by malicious entities. By including these tokens in web forms, developers can prevent attackers from tricking users into making unwanted actions without their knowledge.

What is the primary purpose of a cybersecurity policy within an organization?

  • Educating employees on threats
  • Establishing a secure perimeter
  • Protecting against malware
  • Setting up firewalls
The primary purpose of a cybersecurity policy is to establish a secure perimeter. This means defining and maintaining boundaries to protect an organization's assets, information, and technology infrastructure from external threats. It is a proactive approach to safeguarding an organization's digital assets.

Security awareness training primarily aims to address which of the following risks?

  • External threats like hackers
  • Insider threats
  • Natural disasters
  • Network downtime
Security awareness training is designed to address insider threats. This training helps employees recognize and prevent security breaches, making them more vigilant against unintentional or malicious actions that could harm the organization's security.

Sarah, a new employee, is having trouble accessing a secure office. A friendly co-worker she hasn't met offers to let her in using his access card. This scenario is an example of which social engineering technique?

  • Tailgating
  • Phishing
  • Spear Phishing
  • Vishing
This scenario is an example of "Tailgating." Tailgating involves an unauthorized person following an authorized person into a secured area. In this case, Sarah's friendly co-worker is exploiting her trust to gain access to the secure office.