Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A set of security controls or system settings used to ensure uniformity of configuration through the IT environment?

A.

Patches

B.

Inventory

C.

Baseline

D.

Policy

What is a security token used to authenticate a user to a web application, typically after they log in?

A.

CAPTCHA

B.

API key

C.

CSRF token

D.

Session token

A company wants to ensure that its employees can evacuate the building in case of an emergency. Which physical control is best suited?

A.

Fire alarms

B.

Exit signs

C.

Emergency lighting

D.

Emergency exit doors

Which principle states that users should have access only to the specific data and resources needed to perform required tasks?

A.

Zero Trust

B.

Defense in Depth

C.

Least Privilege

D.

All

TCP and UDP reside at which layer of the OSI model?

A.

Session

B.

Transport

C.

Data Link

D.

Presentation

A centralized organizational function that monitors, detects, and analyzes security events to prevent disruptions is called:

A.

IRP

B.

BCP

C.

SOC

D.

DRP

Which activity is often associated with Disaster Recovery efforts?

A.

Running anti-malware

B.

Vulnerability scanning

C.

Zero-day exploits

D.

Employees returning to the primary production location

A collection of actions that must be followed to complete a task or process in accordance with a set of rules is known as:

A.

Policy

B.

Procedure

C.

Law

D.

Standard

A common network device used to filter traffic?

A.

Server

B.

Endpoint

C.

Ethernet

D.

Firewall

Which is the loopback address?

A.

::1

B.

127.0.0.1

C.

255.255.255.0

D.

Both A and B