Which encryption algorithm, once considered very secure, is now deemed vulnerable due to advances in computing power?

  • AES
  • DES (Data Encryption Standard)
  • RSA
  • SHA-1
DES (Data Encryption Standard) is an encryption algorithm that was once considered very secure but is now deemed vulnerable due to advances in computing power. It has been replaced by more secure algorithms like AES.

Which of the following is not typically a part of an effective incident response plan?

  • Communication plan
  • Data backup plan
  • Incident classification and prioritization
  • Security awareness training
Security awareness training is not typically a direct part of an incident response plan but rather a proactive measure to educate employees about security best practices. An incident response plan focuses on how to react to and mitigate security incidents after they occur.

Which type of IDS analyzes network traffic patterns and compares them with known attack signatures?

  • Anomaly-based Intrusion Detection System
  • Antivirus Software
  • Host-based Intrusion Detection System
  • Network-based Intrusion Detection System
A network-based IDS (NIDS) analyzes network traffic patterns and compares them with known attack signatures to identify malicious activity within a network, making it a crucial component of network security.

What is the primary purpose of Data Loss Prevention (DLP) solutions?

  • Enhance network performance
  • Ensure fast data transfer
  • Prevent unauthorized access
  • Prevent unauthorized data loss
Data Loss Prevention (DLP) solutions are primarily designed to prevent unauthorized data loss. They help organizations monitor, detect, and prevent the unauthorized sharing or leakage of sensitive information, ensuring data security and compliance with data protection regulations.

An organization has detected an ongoing cyber attack. They've isolated the affected systems and are now focused on removing the threat and securing the systems to prevent the same attack in the future. Which phase of incident response are they currently in?

  • Containment
  • Eradication and Recovery
  • Identification and Detection
  • Preparation and Prevention
The organization is in the 'Eradication and Recovery' phase of incident response, where they are actively working to remove the threat and recover affected systems. This phase follows detection and containment.

To effectively mitigate insider threats, organizations should focus on both technological solutions and fostering a culture of _______.

  • Access Control
  • Least Privilege
  • Security Awareness
  • Vulnerability Scanning
Organizations should focus on fostering a culture of "Security Awareness" to mitigate insider threats. This involves educating employees about security best practices and encouraging a shared responsibility for protecting the organization's data and systems.

The _______ protocol of IPsec ensures authentication and data integrity but not confidentiality.

  • AH (Authentication Header)
  • DNS (Domain Name System)
  • ESP (Encapsulating Security Payload)
  • IKE (Internet Key Exchange)
The AH (Authentication Header) in IPsec provides authentication and data integrity, but it doesn't offer confidentiality.

An organization implements a new software solution and within a week receives a message on their server stating that their data has been encrypted and will only be released upon payment. Which type of cybersecurity threat is this scenario depicting?

  • Data Breach
  • Phishing Attack
  • Ransomware Attack
  • Zero-Day Exploit
This scenario depicts a ransomware attack. Ransomware is a type of malware that encrypts a victim's data and demands a ransom for the decryption key. It is a serious cybersecurity threat that can lead to data loss and financial losses.

In the context of operating systems, what is the primary purpose of a security policy?

  • Control system updates
  • Define rules and guidelines for system security
  • Manage user accounts
  • Optimize system performance
In the context of operating systems, a security policy's primary purpose is to define rules and guidelines for system security. It outlines what actions are allowed and what is prohibited, helping to protect the system from unauthorized access, data breaches, and other security threats. Security policies are crucial for maintaining the integrity and confidentiality of a computer system.

HIPAA’s Privacy Rule establishes national standards to protect what kind of individual information?

  • Financial data
  • Personal communication records
  • Protected health information (PHI)
  • Social Security numbers
HIPAA's Privacy Rule establishes national standards to protect Protected Health Information (PHI). PHI includes health records, medical history, patient identifiers, and other health-related data. These regulations are crucial for ensuring the privacy and security of sensitive health information.