Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An attack in which a user authenticated to a server unknowingly invokes unwanted actions after visiting a malicious website is known as:

A.

XSS

B.

CSRF

C.

Spoofing

D.

ALL

Which OSI layer does a VPN primarily operate at?

A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

What is the purpose of defense in depth?

A.

Implement only technical controls

B.

Provide unrestricted access

C.

Establish multiple layered security controls

D.

Guarantee no cyberattacks

Walmart has a large e-commerce presence worldwide. Which solution would ensure the LOWEST possible latency for customers using their services?

A.

CDN

B.

SaaS

C.

Load balancing

D.

Decentralized data centers

To avoid bodily injury claims, a company decides not to offer high-risk services. This is an example of:

A.

Risk Acceptance

B.

Risk Assessment

C.

Risk Avoidance

D.

Risk Control

XenServer, LVM, Hyper-V, and ESXi are:

A.

Type 2 hypervisors

B.

Type 1 hypervisors

C.

Both

D.

None

The Bell–LaPadula access control model is a form of:

A.

RBAC

B.

MAC

C.

DAC

D.

ABAC

Is defined as the process of identifying, estimating, and prioritizing risks.

A.

Risk Assessment

B.

Risk Treatment

C.

Risk Mitigation

D.

Risk Management

What is the purpose of multi-factor authentication (MFA) in IAM?

A.

To simplify user access

B.

To eliminate the need for authentication

C.

To add an additional layer of security by requiring multiple forms of verification

D.

To grant unrestricted access to all users

A transaction over $50,000 requires approval from both a manager and an accountant. Which concept applies?

A.

MAC

B.

Defense in Depth

C.

Two-Person Integrity

D.

Principle of Least Privilege