A company conducts a simulated phishing attack on its employees as part of its security training. A majority of employees report the email and don't click on the links. This type of simulation is primarily used to assess what?
- Employee Awareness
- Encryption Strength
- Firewall Effectiveness
- Malware Detection
This simulation primarily assesses employee awareness. Conducting simulated phishing attacks helps gauge how well employees can recognize and respond to phishing attempts, contributing to an overall culture of cybersecurity awareness.
Under GDPR, organizations must report data breaches to the relevant supervisory authority within how many hours of becoming aware?
- 24 hours
- 48 hours
- 72 hours
- 96 hours
Under the General Data Protection Regulation (GDPR), organizations must report data breaches to the relevant supervisory authority within 72 hours of becoming aware of the breach. This prompt reporting requirement is designed to ensure swift action and notification to protect individuals' privacy.
In the context of access control, the decision to grant or deny a user's request is referred to as _______.
- Authentication
- Authorization
- Validation
- Verification
Authorization is the process of deciding whether a user's request should be granted or denied. It's the step that follows authentication and validation and determines the level of access a user has to resources based on their permissions or privileges.
The process of examining code for security vulnerabilities before it's executed in a live environment is known as?
- Code Review
- Dynamic Testing
- Pre-execution Analysis
- Runtime Analysis
Code review is the process of examining code for security vulnerabilities before it's executed in a live environment. This helps identify and fix security issues in the code.
In TLS, what cryptographic process is used to establish a shared secret between the client and server without ever transmitting the secret itself?
- DES Encryption
- Diffie-Hellman Key Exchange
- MD5 Hash Algorithm
- RSA Key Exchange
In TLS, the Diffie-Hellman Key Exchange is used to establish a shared secret without transmitting the secret itself. This process allows secure key exchange even if eavesdroppers are present.
The principle of "_______" ensures that critical tasks or functions are not controlled by a single individual.
- Access Control
- Defense in Depth
- Least Privilege
- Vulnerability Scanning
The principle of "Least Privilege" is a security concept that restricts individual users' access rights to the minimum levels necessary to accomplish their tasks. It ensures that no single person has excessive access, reducing the risk of unauthorized actions or potential damage.
In the context of mobile security, what does BYOD stand for?
- Bring Your Own Data
- Bring Your Own Device
- Build Your Own Device
- Business Yearning Over Devices
BYOD stands for "Bring Your Own Device." This policy allows employees to use their personal devices (such as smartphones, tablets, or laptops) for official work purposes. It can enhance flexibility and productivity but also poses security challenges that need to be addressed.
A primary technique to mitigate code injection attacks is to avoid executing code that is:
- Dynamic
- Encoded
- Trusted
- Untrusted
Mitigating code injection attacks involves not executing untrusted code. Untrusted code can contain malicious commands that may lead to security vulnerabilities.
What is the primary purpose of disk encryption?
- Improve disk performance
- Prevent physical damage
- Protect data from unauthorized access
- Reduce storage space
The primary purpose of disk encryption is to protect data from unauthorized access. When data on a disk is encrypted, it is converted into a form that can only be read with the correct decryption key or password, making it inaccessible to unauthorized users. This helps safeguard sensitive information even if the physical disk is lost or stolen.
The process of ensuring that both parties in a communication are who they claim to be, especially in the SSL/TLS handshake, is known as what?
- Authentication
- Authorization
- Decryption
- Encryption
Authentication is the process of verifying the identity of parties in a communication. In SSL/TLS, it ensures that the client and server are who they claim to be, typically using digital certificates.