Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What does Personally Identifiable Information (PII) pertain to?

A.

Information about an individual's health status

B.

Data about an individual that could be used to identify them

C.

Trade secrets, research, business plans, and intellectual property

D.

The importance assigned to information by its owner

Which is related to standards?

A.

NIST

B.

GDPR

C.

HIPAA

D.

All

Exhibit.

IPSec works in which layer of OSI Model

A.

Layer 2

B.

Layer 5

C.

Layer 3

D.

Layer 7

An entity that exploits system vulnerabilities is known as a:

A.

Attacker

B.

Threat vector

C.

Threat

D.

Threat actor

Which term describes a communication tunnel that provides point-to-point transmission of authentication and data traffic over an untrusted network?

A.

Zero Trust

B.

DMZ

C.

VPN

D.

None of the above

Which OSI layer is the primary target of a buffer overflow attack?

A.

Layer 7

B.

Layer 3

C.

Layer 5

D.

Layer 4

An external entity attempts unauthorized access to your IT environment. This is a(n):

A.

Exploit

B.

Intrusion

C.

Event

D.

Malware

Which type of network is set up similar to the internet but is private to an organization? Select the MOST appropriate answer.

A.

Extranet

B.

VLAN

C.

Intranet

D.

VPN

What is an IPSec replay attack?

A.

An attack where an attacker modifies packets in transit

B.

An attack where an attacker eavesdrops on network traffic

C.

An attack where an attacker overloads a network with traffic

D.

An attack where an attacker attempts to inject packets in an existing session

In what way do a victim’s files get affected by ransomware?

A.

By destroying them

B.

By encrypting them

C.

By stealing them

D.

By selling them