John, a network administrator, notices a sudden spike in outbound traffic from a single workstation in the organization. Upon further investigation, he discovers that the workstation is contacting multiple external IP addresses. This could be indicative of which type of threat?

  • Botnet Infection
  • Data Exfiltration
  • Insider Threat
  • Malware Infection
The sudden spike in outbound traffic from a workstation contacting multiple external IP addresses is a strong indicator of a botnet infection. A botnet is a network of compromised devices controlled by an attacker, often used for various malicious activities, including sending spam or launching DDoS attacks.

Which layer of the OSI model does SSL/TLS primarily operate at?

  • Application
  • Data Link Layer
  • Physical Layer
  • Transport Layer
SSL/TLS (Secure Sockets Layer/Transport Layer Security) primarily operates at the Application Layer (Layer 7) of the OSI model. It provides encryption and security for application-level data.

Which component of a digital certificate proves the identity of the certificate's subject?

  • Certificate Authority's Signature
  • Private Key
  • Public Key
  • Subject's Name
The Subject's Name in a digital certificate is what proves the identity of the certificate's subject. It typically contains information about the entity or individual the certificate is issued to, such as their name and organization.

For secure file transfers, SFTP operates on the _______ layer, while SCP operates on the _______ layer of the OSI model.

  • Application, Data Link
  • Data Link, Physical
  • Presentation, Transport
  • Transport, Network
For secure file transfers, SFTP (Secure File Transfer Protocol) operates at the Presentation layer of the OSI model, providing encryption, compression, and data formatting services. In contrast, SCP (Secure Copy Protocol) operates at the Transport layer of the OSI model, providing secure and efficient file transfer over a network.

For which reason might an organization regularly update its cybersecurity procedures?

  • Branding Enhancement
  • Business Expansion
  • Compliance
  • Cost Reduction
Organizations may regularly update their cybersecurity procedures to maintain compliance with evolving regulations and standards. Compliance is crucial as non-compliance can lead to legal issues and data breaches. Keeping procedures up-to-date helps an organization adapt to changing legal requirements.

A backup technique that captures every version of a file or database record every time it changes is referred to as _______ backup.

  • Differential
  • Full
  • Incremental
  • Versioning
A backup technique that captures every version of a file or database record every time it changes is referred to as "Versioning" backup. This type of backup maintains a history of changes, allowing you to restore a file or record to a specific point in time.

Which header can be used by web applications to instruct the browser to block certain types of attacks by declaring which sources are legitimate?

  • Access-Control-Allow-Origin
  • Content-Security-Policy
  • Cross-Origin Resource Sharing
  • Referrer-Policy
The "Content-Security-Policy" header is used to instruct the browser to block certain types of attacks, such as XSS, by specifying which sources are considered legitimate for loading content.

A software company releases a critical security update for its widely-used application. After a week, a major cyber attack targets organizations that have not applied this update. This scenario underscores the importance of what?

  • Firewall Configuration
  • Intrusion Detection
  • Patch Management
  • Secure Coding
This scenario highlights the critical importance of patch management. Failing to apply security updates promptly can leave systems vulnerable to known exploits.

A phishing attack that involves multiple methods, such as emails and phone calls, to deceive victims is known as?

  • Smishing
  • Spear Phishing
  • Vishing
  • Whaling
Whaling is a type of phishing attack that specifically targets high-profile individuals or senior executives within an organization. It often involves various methods, such as emails, phone calls, and even in-person social engineering, to deceive victims and gain sensitive information or access.

The use of multiple layers of security measures, including both malware detection and patch management, is referred to as a _______ approach.

  • Defense-in-Depth
  • Multi-Factor Authentication
  • Redundant Backup
  • Single Sign-On
Defense-in-Depth is a security strategy that employs multiple layers of security controls and measures to protect against various security threats. This approach includes not only malware detection but also patch management, firewalls, intrusion detection systems, and more, creating a robust security posture.