When employees fail to report security incidents due to fear of reprisal, it's often a sign of a weak _______ culture.
- Compliance
- Ethical
- Organizational
- Security
When employees fail to report security incidents due to fear of reprisal, it's often a sign of a weak organizational culture. A strong security culture encourages employees to report incidents without fear of negative consequences and emphasizes the importance of security.
After adopting a new BYOD policy, a company notices an increase in security incidents related to mobile devices. What might be an effective measure to decrease these incidents while still allowing BYOD?
- Ban BYOD entirely
- Decrease the security awareness training
- Implement Mobile Device Management (MDM) solutions
- Increase the number of personal devices allowed
Implementing Mobile Device Management (MDM) solutions can be an effective measure to decrease security incidents related to mobile devices while still allowing BYOD. MDM solutions provide better control and security for company data on personal devices, allowing for features like remote wipe, device encryption, and app management to mitigate risks.
The process of continuously monitoring systems for vulnerabilities and applying necessary patches is known as _______.
- Firewall Configuration
- Intrusion Detection
- Penetration Testing
- Vulnerability Management
Vulnerability Management involves the systematic process of identifying and addressing vulnerabilities in a network or system. It includes vulnerability scanning, assessment, and patch management to ensure that the system is protected from known vulnerabilities.
To ensure that personal apps do not access company data on a BYOD device, organizations implement _______ solutions.
- DNS
- IDS
- MDM
- VPN
To ensure that personal apps do not access company data on a BYOD (Bring Your Own Device) device, organizations implement MDM (Mobile Device Management) solutions. MDM allows organizations to control and secure mobile devices used by their employees.
Stored and reflected are two types of which web application security vulnerability?
- Cross-Site Request Forgery
- Cross-Site Scripting (XSS)
- Information Disclosure
- SQL Injection
"Stored" and "Reflected" are two types of Cross-Site Scripting (XSS) vulnerabilities, which involve injecting malicious scripts into web pages that are viewed by other users.
A company's network administrator notices that an external IP address is repeatedly trying to access the company's internal resources. However, the firewall denies each attempt, and the source IP changes frequently. What type of attack might this represent?
- DDoS Attack
- Man-in-the-Middle (MitM) Attack
- Port Scanning
- Spear Phishing
This scenario suggests 'Port Scanning,' where an attacker systematically scans a range of ports on a network to identify vulnerabilities or open services.
The process of allowing certain traffic to bypass the usual security inspection based on specific criteria is known as firewall _______.
- Bypass
- Exception
- Exemption
- Whitelisting
Firewall 'Exception' allows specific traffic to bypass regular security inspection, based on predefined criteria or exceptions.
Jane, a network administrator, notices that a server's SSL certificate has expired. If the certificate isn't renewed, what could be a potential impact on the server's users?
- Users will experience SSL errors while connecting to the server.
- Users will have slower internet access.
- Users will lose access to the server.
- Users will need to update their passwords.
An expired SSL certificate will result in SSL errors, which can disrupt secure connections, leading to a loss of trust and potential security risks for the server's users.
_______ provides a way to ensure the integrity of data stored on disk by verifying that it hasn't been tampered with.
- Firewall
- Hashing
- Proxy
- RAID
Hashing provides data integrity by producing a fixed-size hash value (digest) based on the content of the data. If the data changes, the hash value will also change, making it easy to detect any tampering or corruption.
Regularly scheduled backups that only capture the data that has changed since the last full backup are known as what?
- Differential Backups
- Full Backups
- Incremental Backups
- Mirror Backups
Incremental Backups capture only the data that has changed since the last backup, whether it was a full backup or a previous incremental backup. This reduces the backup time and storage space needed.