Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which is an example of a deterrent control?

A.

Biometric

B.

Guard dog

C.

Encryption

D.

Turnstile

In which phase of an incident response plan are incidents prioritized?

A.

Post-incident activity

B.

Containment, eradication, and recovery

C.

Detection and analysis

D.

Preparation

Communication between end systems is encrypted using a key, often known as ________?

A.

Temporary key

B.

Section key

C.

Public key

D.

Session key

Which zero-trust component breaks LANs into very small, localized security zones?

A.

Zero Trust

B.

DMZ

C.

VPN

D.

Microsegmentation

An attacker places themselves between two communicating devices is known as:

A.

Phishing

B.

Spoofing

C.

On-Path attack

D.

All

How many bits represent the Organizationally Unique Identifier (OUI) in MAC addresses?

A.

16 bits

B.

48 bits

C.

24 bits

D.

32 bits

Which logical control best protects confidential data from unauthorized access?

A.

Encryption

B.

Firewall

C.

Antivirus

D.

Hashing

In incident terminology, a zero-day is:

A.

Days with a cybersecurity incident

B.

A previously unknown system vulnerability

C.

Days without a cybersecurity incident

D.

Days to solve a previously unknown system vulnerability

Which of the following is unlikely to be a member of the disaster recovery team?

A.

Executive management

B.

Public relations

C.

Billing clerk

D.

IT personnel

A backup is which type of security control?

A.

Preventive

B.

Deterrent

C.

Recovery

D.

Corrective