When an IDS generates an alert for an activity that isn't actually malicious, it's termed as a _______.

  • False Negative
  • False Positive
  • True Negative
  • True Positive
When an IDS generates an alert for non-malicious activity, it's called a 'False Positive,' indicating a potential security concern that is, in fact, benign.

When an attacker leaves a malware-infected USB drive in a public place hoping someone will find it and plug it into a computer, this technique is known as?

  • Baiting
  • Pharming
  • Phishing
  • Spoofing
This technique is called "baiting." It involves leaving a device (in this case, a malware-infected USB drive) in a location where someone may find it and plug it into a computer out of curiosity. Once connected, the malware can infect the victim's computer.

When performing ethical hacking, what permission level should the hacker ideally have?

  • Limited Access
  • No Permission
  • Root/Administrator Access
  • Standard User
Ethical hackers should ideally have Standard User permissions. Giving them full access could lead to unintended consequences, while having no access impedes their work. Standard User access provides a balance of access for testing without causing harm.

Which cryptographic technique ensures that the content of a message or document has not been altered during transmission?

  • Compression
  • Encryption
  • Hashing
  • Steganography
Hashing is a cryptographic technique that ensures data integrity. It creates a fixed-size hash value from the original data, and any alteration in the data will result in a different hash value, indicating that the data has been tampered with.

Emily, a system administrator, is configuring a new server. She ensures that only necessary services run, disables default accounts, and sets strong password policies. What process is Emily engaged in?

  • Patch Management
  • Server Clustering
  • Server Hardening
  • Server Virtualization
Emily is engaged in the process of "Server Hardening." This involves securing a server by minimizing vulnerabilities, such as disabling unnecessary services, strengthening password policies, and removing or disabling default accounts. The goal is to reduce the server's attack surface.

A common technique used by attackers where they trick users into revealing their passwords by pretending to be legitimate tech support is called _______.

  • Phishing
  • Ransomware
  • Social Engineering
  • Spear Phishing
The technique where attackers trick users into revealing their passwords by pretending to be legitimate tech support is known as Social Engineering. It's a psychological manipulation technique to gain confidential information.

The GDPR regulation primarily pertains to the protection of personal data for citizens of which region?

  • Australia
  • Canada
  • European Union
  • United States
The GDPR (General Data Protection Regulation) primarily pertains to the protection of personal data for citizens of the European Union. It is a comprehensive data protection law that sets strict standards for how organizations handle personal data of EU residents, regardless of where the organization is based.

What is the primary purpose of Data Loss Prevention (DLP) solutions?

  • Enhance network performance
  • Ensure fast data transfer
  • Prevent unauthorized access
  • Prevent unauthorized data loss
Data Loss Prevention (DLP) solutions are primarily designed to prevent unauthorized data loss. They help organizations monitor, detect, and prevent the unauthorized sharing or leakage of sensitive information, ensuring data security and compliance with data protection regulations.

An organization has detected an ongoing cyber attack. They've isolated the affected systems and are now focused on removing the threat and securing the systems to prevent the same attack in the future. Which phase of incident response are they currently in?

  • Containment
  • Eradication and Recovery
  • Identification and Detection
  • Preparation and Prevention
The organization is in the 'Eradication and Recovery' phase of incident response, where they are actively working to remove the threat and recover affected systems. This phase follows detection and containment.

To effectively mitigate insider threats, organizations should focus on both technological solutions and fostering a culture of _______.

  • Access Control
  • Least Privilege
  • Security Awareness
  • Vulnerability Scanning
Organizations should focus on fostering a culture of "Security Awareness" to mitigate insider threats. This involves educating employees about security best practices and encouraging a shared responsibility for protecting the organization's data and systems.