-
web.groovymark@gmail.com
- December 2, 2024
Question 01
What is the main purpose of a cloud access security broker (CASB)?
a) To provide a secure connection for remote users
b) To mediate access to cloud services
c) To monitor on-premises security
d) To manage local network traffic
Correct Answer: b) To mediate access to cloud services
Explanation: CASBs act as intermediaries that enforce security policies for cloud services by managing access and monitoring user activities.
Question 02
What type of Azure AD object should be used to manage delegation of permissions within an Azure AD administrative unit?
a) Security group
b) User
c) Custom role
d) Built-in role
Correct Answer: d) Built-in role
Explanation: Built-in roles facilitate the delegation of permissions in Azure AD administrative units.
Question 03
What is the primary benefit of using serverless computing?
a) Increased hardware costs
b) No need to manage servers
c) Reduced latency in applications
d) Increased complexity in development
Correct Answer: b) No need to manage servers
Explanation: Serverless computing abstracts the infrastructure management, allowing developers to focus on writing code without worrying about server maintenance.
Question 04
What does the term “zero trust” refer to in cybersecurity?
a) A model that trusts all internal users
b) A model that requires verification for every request
c) A framework for managing firewalls
d) A type of malware
Correct Answer: b) A model that requires verification for every request
Explanation: The zero trust model operates on the principle of "never trust, always verify," meaning every access request must be authenticated and authorized regardless of its origin.
Question 05
Which of the following is a characteristic of the control plane in software-defined networking (SDN)?
a) It forwards data packets
b) It manages traffic policies
c) It monitors network health
d) It establishes physical connections
Correct Answer: b) It manages traffic policies
Explanation: The control plane in SDN is responsible for making decisions about traffic management and routing, setting policies for data flow.
Question 06
What is the role of the data plane in SDN?
a) To configure network policies
b) To handle actual data traffic
c) To monitor network performance
d) To store network configuration
Correct Answer: b) To handle actual data traffic
Explanation: The data plane is responsible for forwarding and routing the actual data packets based on the policies set by the control plane.
Question 07
In cybersecurity, what does “threat modeling” involve?
a) Assessing the risk of data loss
b) Identifying and assessing potential threats
c) Implementing security controls
d) Responding to security incidents
Correct Answer: b) Identifying and assessing potential threats
Explanation: Threat modeling is a systematic approach to identifying, assessing, and prioritizing threats to a system or application.
Question 08
What does the term “vulnerability” refer to in cybersecurity?
a) A successful attack on a system
b) A weakness that can be exploited
c) A type of malware
d) A security protocol
Correct Answer: b) A weakness that can be exploited
Explanation: A vulnerability is a flaw or weakness in a system that can be exploited by attackers to gain unauthorized access or cause harm.
Question 09
What is the primary purpose of endpoint detection and response (EDR) solutions?
a) To secure cloud environments
b) To provide real-time monitoring of endpoints
c) To manage user access
d) To facilitate data backups
Correct Answer: b) To provide real-time monitoring of endpoints
Explanation: EDR solutions focus on detecting and responding to threats on endpoint devices by providing continuous monitoring and threat detection capabilities.
Question 10
Which of the following is a benefit of using multi-factor authentication (MFA)?
a) Simplified user access
b) Enhanced security
c) Reduced operational costs
d) Faster login times
Correct Answer: b) Enhanced security
Explanation: MFA adds an additional layer of security by requiring multiple forms of verification before granting access, making it more difficult for unauthorized users to gain access.
Question 11
What does “encryption” achieve in data security?
a) It slows down system performance
b) It obscures data to protect it from unauthorized access
c) It permanently deletes data
d) It enhances data visibility
Correct Answer: b) It obscures data to protect it from unauthorized access
Explanation: Encryption transforms data into a format that is unreadable without the appropriate decryption key, protecting it from unauthorized access.
Question 12
In the context of cloud computing, what does the term “hybrid cloud” refer to?
a) A cloud that only supports virtual machines
b) A combination of on-premises and cloud resources
c) A type of public cloud service
d) A proprietary cloud solution
Correct Answer: b) A combination of on-premises and cloud resources
Explanation: A hybrid cloud environment integrates on-premises infrastructure with cloud services, allowing for greater flexibility and deployment options.
Question 13
What is the primary function of a web application firewall (WAF)?
a) To protect network devices
b) To filter and monitor HTTP traffic
c) To encrypt data in transit
d) To authenticate users
Correct Answer: b) To filter and monitor HTTP traffic
Explanation: A WAF is designed to protect web applications by filtering and monitoring HTTP traffic to and from a web application, helping to prevent attacks like SQL injection and cross-site scripting.
Question 14
Which of the following best describes “malware”?
a) Software that improves system performance
b) Software designed to disrupt, damage, or gain unauthorized access
c) A type of encryption
d) A network protocol
Correct Answer: b) Software designed to disrupt, damage, or gain unauthorized access
Explanation: Malware refers to malicious software created to harm, exploit, or otherwise compromise a system or network.
Question 15
What is a significant advantage of using encryption for data at rest?
a) It reduces storage costs
b) It prevents data loss
c) It protects sensitive data from unauthorized access
d) It enhances data sharing capabilities
Correct Answer: c) It protects sensitive data from unauthorized access
Explanation: Encrypting data at rest ensures that even if the data is accessed without authorization, it remains unreadable without the decryption key.
Question 16
What does “data loss prevention” (DLP) technology primarily focus on?
a) Enhancing data backup processes
b) Preventing unauthorized data access or transmission
c) Improving network performance
d) Encrypting data in transit
Correct Answer: b) Preventing unauthorized data access or transmission
Explanation: DLP technology is designed to monitor and control the movement of sensitive data to prevent unauthorized access and data breaches.
Question 17
Which of the following is an example of a technical security control?
a) Security policies
b) User training
c) Firewalls
d) Incident response plans
Correct Answer: c) Firewalls
Explanation: Firewalls are a technical security control used to monitor and filter incoming and outgoing network traffic based on predetermined security rules.
Question 18
What is the primary function of an intrusion detection system (IDS)?
a) To prevent unauthorized access
b) To monitor network traffic for suspicious activity
c) To encrypt sensitive data
d) To manage user permissions
Correct Answer: b) To monitor network traffic for suspicious activity
Explanation: An IDS is designed to detect and alert administrators to potential security breaches or malicious activities within a network.
Question 19
What is a “phishing” attack?
a) An attack that targets hardware vulnerabilities
b) A social engineering attack to obtain sensitive information
c) A type of denial-of-service attack
d) An attack that uses brute force to crack passwords
Correct Answer: b) A social engineering attack to obtain sensitive information
Explanation: Phishing attacks involve tricking individuals into revealing sensitive information, such as passwords or credit card numbers, often through deceptive emails or websites.
Question 20
In cloud computing, what does “elasticity” refer to?
a) The ability to recover from data loss
b) The ability to scale resources up or down as needed
c) The capability to use multiple cloud providers
d) The process of securing cloud data
Correct Answer: b) The ability to scale resources up or down as needed
Explanation: Elasticity allows cloud services to dynamically allocate resources based on demand, ensuring optimal performance and cost-effectiveness.