Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Example of a technical control:

A.

Security guard

B.

GPS installed in a vehicle to track location

C.

Door lock

D.

None

A system crash results in loss of data. What term best describes this?

A.

Breach

B.

Incident

C.

Event

D.

Adverse event

A company wants employees to access resources from anywhere in the world. Which access control model is best?

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

A measure of an organization’s baseline security performance is a:

A.

Security assessment

B.

Security audit

C.

Security benchmark

D.

Security management

What is remanence?

A.

The ability of retaining magnetization in a storage disk after deletion

B.

Files or pieces of files get scattered throughout your disks

C.

Data corruption due to disk failure

D.

All

If a device is found to be non-compliant with the security baseline, what action should the security team take?

A.

Report

B.

Evaluate

C.

Ignore

D.

Disable or isolate it into a quarantine area until it can be checked and updated

Faking the sender address to gain unauthorized access is known as:

A.

Phishing

B.

ARP

C.

Spoofing

D.

All

Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset. Microsegmentation of workloads is a tool of the model.

A.

Zero Trust

B.

DMZ

C.

VLAN

D.

Microsegmentation

Which threat is directly associated with malware?

A.

APT

B.

Ransomware

C.

Trojan

D.

DDoS