Advanced Persistent Threats (APTs) typically involve long-term attacks that focus on _______ rather than immediate harm.

  • DDoS Attacks
  • Data Exfiltration
  • Exploiting Vulnerabilities
  • Phishing Campaigns
APTs aim at "Data Exfiltration," which involves stealing data over an extended period, focusing on long-term gains, not causing immediate harm.

IPsec is a suite of protocols designed to secure what type of communication?

  • Email
  • Internet browsing
  • Network
  • Wireless connections
IPsec (Internet Protocol Security) is designed to secure network communication, ensuring data integrity and confidentiality. It's often used to create VPNs for secure network connections.

DLP solutions often use _______ to detect sensitive data based on predefined criteria.

  • Biometrics
  • Encryption
  • Firewalls
  • Machine Learning
Data Loss Prevention (DLP) solutions often employ Machine Learning algorithms to identify and classify sensitive data. These algorithms learn from historical data and predefined criteria to recognize patterns associated with sensitive information, helping prevent data leaks and breaches.

Which tool is commonly used to scan a computer system for known malware signatures?

  • Antivirus
  • Browser
  • Firewall
  • VPN
Antivirus software is commonly used to scan a computer system for known malware signatures. It compares files and activities on the computer to a database of known malware signatures to detect and remove malicious software.

In the context of firewalls, what does the term "stateful inspection" refer to?

  • A method for tracking network packets
  • A process for encrypting data transmissions
  • A technique for blocking network traffic
  • A way to filter website content
"Stateful inspection" in firewalls refers to the method of tracking the state of active connections and making decisions based on the context of the traffic, enhancing security by understanding the state of network connections.

The principle that emphasizes using multiple layers of security measures to protect information and systems is called what?

  • Defense-in-Depth
  • Encryption
  • Single Sign-On (SSO)
  • Two-Factor Authentication
Defense-in-Depth is a security strategy that advocates implementing multiple layers of security measures. This approach helps to provide redundancy and ensure that even if one layer is breached, other layers can still protect the system. Single Sign-On, Two-Factor Authentication, and Encryption are important security concepts but not the same as Defense-in-Depth.

The GDPR regulation primarily pertains to the protection of personal data for citizens of which region?

  • Australia
  • Canada
  • European Union
  • United States
The GDPR (General Data Protection Regulation) primarily pertains to the protection of personal data for citizens of the European Union. It is a comprehensive data protection law that sets strict standards for how organizations handle personal data of EU residents, regardless of where the organization is based.

An organization is looking to secure its sensitive data transmissions over the internet. They decide to use a system where both the sender and the receiver have a set of keys, one public and one private. Which encryption system are they likely implementing?

  • AES
  • DES
  • RSA
  • SHA-256
They are likely implementing the RSA (Rivest-Shamir-Adleman) encryption system. RSA is a widely used public-key encryption system where each participant has a pair of keys: a public key for encryption and a private key for decryption. This ensures secure data transmission and is often used in secure communications and digital signatures.

Which encryption algorithm, once considered very secure, is now deemed vulnerable due to advances in computing power?

  • AES
  • DES (Data Encryption Standard)
  • RSA
  • SHA-1
DES (Data Encryption Standard) is an encryption algorithm that was once considered very secure but is now deemed vulnerable due to advances in computing power. It has been replaced by more secure algorithms like AES.

Which of the following is not typically a part of an effective incident response plan?

  • Communication plan
  • Data backup plan
  • Incident classification and prioritization
  • Security awareness training
Security awareness training is not typically a direct part of an incident response plan but rather a proactive measure to educate employees about security best practices. An incident response plan focuses on how to react to and mitigate security incidents after they occur.