David is setting up a new computer for his company's CEO. He wants to ensure that even if the laptop is lost or stolen, the data on it cannot be accessed without proper authentication. Which of the following would be the most effective solution?

  • Antivirus Software
  • Biometric Authentication
  • Firewall
  • Full Disk Encryption
The most effective solution for ensuring that data on a lost or stolen laptop cannot be accessed without proper authentication is Full Disk Encryption. Full Disk Encryption encrypts the entire contents of the hard drive, making the data inaccessible without the correct decryption key or password.

In the context of insider threats, what term describes the unintentional actions of employees that lead to security breaches?

  • Espionage
  • Fraud
  • Negligence
  • Sabotage
Negligence in the context of insider threats refers to the unintentional actions or mistakes made by employees that can compromise security. This could include actions like clicking on a malicious link in an email, inadvertently sharing sensitive information, or misconfiguring security settings, all of which can lead to security breaches.

What is the primary difference between a security standard and a security regulation?

  • Standards are legally binding, while regulations are recommendations
  • Standards are long-term, while regulations are short-term
  • Standards are technical, while regulations are organizational
  • Standards are voluntary, while regulations are mandatory
The primary difference lies in the legal status. Security standards are usually voluntary and serve as best practices, while security regulations are legally binding and mandatory, often enforced by governments or industry bodies.

Which secure coding practice helps prevent SQL injection attacks by ensuring that user input does not run as code?

  • Code Encryption
  • Database Backups
  • Input Validation
  • Password Hashing
Input Validation is a practice that checks and sanitizes user input to prevent it from being executed as SQL code, thereby thwarting SQL injection.

One of the primary ways to mitigate insider threats is to implement strict _______ controls.

  • Access
  • Administrative
  • Network
  • Security
One of the primary ways to mitigate insider threats is to implement strict security controls. Security controls can include measures like access restrictions, monitoring, and policies designed to prevent unauthorized access and data breaches.

The process of restoring a system or data from a backup following a disaster or data corruption is termed as what?

  • Data Archiving
  • Data Deduplication
  • Data Migration
  • Disaster Recovery
Disaster Recovery is the process of restoring systems, data, and infrastructure after a disaster, such as a natural catastrophe or a major data breach. It ensures that a business can continue operations after a disruptive event.

Why might an organization choose to implement a split-tunneling VPN configuration?

  • To achieve better compatibility with legacy systems
  • To ensure end-to-end encryption
  • To improve security
  • To reduce network bandwidth usage
An organization may choose split-tunneling to conserve bandwidth by not routing all traffic through the VPN. It's a trade-off between security and efficiency.

In the context of web application security, what is the primary difference between "encoding" and "escaping"?

  • Encoding ensures data integrity, while escaping prevents SQL injection.
  • Encoding is a method for securing APIs, while escaping is used to secure session cookies.
  • Encoding protects against HTML injection, while escaping is used to secure JavaScript.
  • Encoding transforms data into a different format, while escaping makes data safe for use in specific contexts.
Encoding involves changing data into a different format so that it's safe for a particular context, such as converting special characters to HTML entities. Escaping, on the other hand, ensures data is safe for use in specific situations, like preventing SQL injection or cross-site scripting (XSS). The main difference is in their purpose and target use cases.

An employee loses their personal smartphone, which they also use for work-related tasks. They immediately report the loss to the IT department, which then remotely wipes the device. This action is most likely in accordance with which organizational policy?

  • BYOD Policy
  • Data Retention Policy
  • Mobile Device Management (MDM) Policy
  • Privacy Policy
This action is most likely in accordance with the Mobile Device Management (MDM) Policy. MDM policies often include provisions for remote device wiping to protect sensitive company data when a device is lost or stolen. It allows IT departments to remotely erase company data and applications from the device to prevent data breaches.

Which advanced cryptographic protocol allows two parties to securely compute a function over their inputs while keeping those inputs private?

  • DES
  • Diffie-Hellman
  • Homomorphic Encryption
  • RSA
Homomorphic Encryption is an advanced cryptographic technique that allows two parties to perform computations on their encrypted data without revealing the data to each other. This is particularly useful in secure multi-party computation and privacy-preserving data analysis.