In the context of regulations, what does GDPR stand for?

  • General Data Privacy Requirement
  • General Data Protection Requirement
  • Global Data Privacy Regulation
  • Global Data Protection Regulation
GDPR stands for the General Data Protection Regulation, which is a European Union regulation designed to protect the privacy and data of EU citizens. It has global implications for organizations dealing with EU citizens' data.

What common practice involves creating a duplicate copy of data to ensure its availability in case of data loss?

  • Data Archiving
  • Data Compression
  • Data Encryption
  • Data Mirroring
Data Mirroring is the practice of creating a duplicate copy of data on another storage device. This is done in real-time or near-real-time to ensure data availability in case of data loss or hardware failure. It provides redundancy and high availability.

In an out-of-band SQL injection attack, data is retrieved using:

  • A separate channel
  • API endpoints
  • HTTP GET requests
  • The same channel with UNION statements
In an out-of-band SQL injection, attackers retrieve data via a separate channel, such as a DNS request, rather than through the same channel as the main application.

Which of the following best describes the primary purpose of a certificate authority (CA) in the SSL/TLS handshake process?

  • Authenticating users
  • Handling encryption keys
  • Issuing digital certificates
  • Providing web hosting
A Certificate Authority (CA) in the SSL/TLS handshake process primarily issues digital certificates. These certificates are used to verify the authenticity of a website, ensuring that the connection is secure and that data is encrypted.

Under GDPR, individuals have the right to access their personal data and the right to _______ it.

  • Alter the Data
  • Correct the Data
  • Delete the Data
  • Share the Data
Under the General Data Protection Regulation (GDPR), individuals have the right to access their personal data held by organizations. This means they can request to correct or update the data if it's inaccurate. This helps individuals maintain the accuracy of their personal information.

_______ is a type of malware that encrypts the user's files and demands payment in exchange for the decryption key.

  • Adware
  • Ransomware
  • Trojan
  • Worm
Ransomware is a type of malware that encrypts the user's files and demands payment in exchange for the decryption key. It is a significant threat to data security and has been responsible for many high-profile cyberattacks.

In public-key cryptography, the decryption key is kept private and is known as the _______ key.

  • Cipher
  • Private
  • Public
  • Secret
In public-key cryptography, the decryption key is kept private, known as the "Private Key." This key is kept secret by the owner and is used to decrypt data that has been encrypted with the corresponding public key.

In the context of threat intelligence, what refers to a set of indicators related to a specific cybersecurity threat?

  • Threat Assessment
  • Threat Intelligence Report
  • Threat Landscape
  • Threat Signature
A "Threat Signature" is a set of indicators that characterize a specific cybersecurity threat, helping in its identification and mitigation.

A _______ VPN provides a secure connection between multiple networks over the internet.

  • Endpoint-to-Endpoint
  • PPTP
  • SSL
  • Site-to-Site
A Site-to-Site VPN connects entire networks securely over the internet. It's commonly used to connect remote offices or cloud services to the main network.

In the context of social engineering, what does "baiting" usually involve?

  • Hiding behind a mask
  • Impersonating someone
  • Offering something enticing to the victim
  • Threatening the victim
Baiting in social engineering involves offering something enticing to the victim. This could be in the form of a free download, a prize, or anything that would make the victim want to take an action that benefits the attacker.