Which phase of incident response involves determining the scope, size, and origin of an incident?

  • Containment
  • Detection
  • Identification
  • Recovery
The Identification phase in incident response involves understanding the incident's scope, size, and origin. This is crucial for formulating an effective response strategy.

An IT security analyst at a company identifies that a number of workstations have become part of a botnet. Which type of malware is most likely responsible for this?

  • Ransomware
  • Spyware
  • Trojan
  • Worm
A botnet is typically composed of a network of infected computers or "zombies," and it's often orchestrated by a worm. Worms can autonomously replicate and spread across a network, making them a common choice for botnet creators.

How does a CSP help in mitigating cross-site scripting (XSS) attacks?

  • By controlling user access permissions
  • By encrypting all data in transit
  • By monitoring server logs
  • By specifying which domains can load resources
A Content Security Policy (CSP) helps mitigate XSS attacks by specifying which domains can load resources on a web page. It provides a whitelist of approved sources for content, helping to prevent malicious scripts from executing from unauthorized sources, thereby enhancing security.

Which of the following is NOT a primary objective of security awareness training?

  • Educating employees on security policies
  • Fostering a security-conscious culture
  • Protecting against all possible threats
  • Reducing security risks
The primary objective of security awareness training is not to protect against all possible threats. It is more about educating employees on security policies, reducing security risks, and fostering a security-conscious culture within the organization. It's important to understand that while training is crucial, no training can guarantee protection against all threats.

In the context of BYOD policies, what refers to the isolation of personal and work data on a single device?

  • Containerization
  • Integration
  • Segmentation
  • Virtualization
Containerization, in the context of BYOD (Bring Your Own Device) policies, refers to the practice of isolating personal and work-related data on a single device within separate, secure containers. These containers keep the data separate, ensuring privacy and security for both personal and work-related information.

What is the primary benefit of a centralized patch management system for an organization?

  • Improved Security
  • Increased Bandwidth
  • Faster Internet Speed
  • Enhanced User Experience
A centralized patch management system (option 1) primarily benefits an organization by improving security. It allows the organization to efficiently and consistently apply software updates, patches, and fixes to all systems, reducing vulnerabilities and enhancing protection against cyber threats.

Digital certificates often use the _______ format, which includes the certificate's public key and information about the key owner.

  • DER (Distinguished Encoding Rules)
  • PEM (Privacy Enhanced Mail)
  • PGP (Pretty Good Privacy)
  • SSL (Secure Sockets Layer)
Digital certificates often use the PEM (Privacy Enhanced Mail) format. This format typically includes the certificate's public key and information about the key owner. PEM is widely used for securing data through encryption and authentication processes, making it an essential part of secure communications.

Which part of a digital signature process involves generating a value that is unique to the signed data?

  • Digital Certificate
  • Hashing
  • Private Key Decryption
  • Public Key Encryption
In the digital signature process, a unique hash value is generated from the data to be signed. This hash value is then encrypted with the sender's private key to create the digital signature. The recipient can use the sender's public key to verify the signature and the integrity of the data.

Digital certificates are issued by trusted third parties called what?

  • Certificate Authorities
  • Domain Registrars
  • Internet Service Providers
  • Social Media Companies
Digital certificates are issued by trusted third parties known as Certificate Authorities (CAs). These entities validate the identity of individuals, organizations, or websites and issue digital certificates, which are used to establish trust and enable secure communication on the internet.

To ensure that the browser enforces the CSP but does not block or report any content, the _______ directive is used.

  • allow-all
  • default-src
  • enforce
  • report-only
To ensure that the browser enforces the Content Security Policy (CSP) but only reports violations without blocking content, the report-only directive is used. This is useful for monitoring policy violations without impacting user experience.