New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the primary goal of Identity and Access Management (1AM) in cybersecurity?

A.

To ensure 100% security against all threats

B.

To provide secure and controlled access to resources

C.

To eliminate the need for user authentication

D.

To monitor network traffic for performance optimization

An unknown person obtaining access to the company file system without authorization is example of

A.

Intrusion

B.

Breach

C.

Exploit

D.

Incident

Can be considered to be a fingerprint of the file or message

A.

Hashing .

B.

encryption

C.

decryption

D.

encoding

Derrick logs on to a system in order to read a file. In this example. Derrick is the______?

A.

Subject

B.

Object

C.

Process

D.

Predicate

What is the purpose of the post incident phase of incident response?

A.

To detect and analyze incidents

B.

To prepare for future incidents

C.

To document lessons learned and improve future incident response effectiveness

D.

To containment and eradicate incidents

A type of malware that downloads onto a computer disguised as a legitimate program

A.

Worm

B.

Trojan

C.

virus

D.

Ransomware

Mark has purchased a MAC LAPTOP. He is scared of losing his screen and planning to buy an insurance policy. So, which risk management strategy is?

A.

Risk acceptance

B.

Risk deterrence

C.

Risk transference

D.

Risk mitigation

A hacker is trying to gain access to a company network which of the following scenarios would be an example of defense in depth

A.

The company relies solely on a firewall to block unauthorized access

B.

The company stores all sensitive data on a single server

C.

The hacker is required to enter a username and password

D.

None

A portion of the organization's network that interfaces directly with the outside world; typically, this exposed area has more security controls and restrictions than the rest of the internal IT environment.

A.

Virtual private network (VPN)

B.

Virtual local area network (VLAN)

C.

Zero Trust

D.

Demilitarized zone (DMZ)

Token Ring used in which OSI Layer

A.

Application

B.

Network

C.

Transport

D.

Physical