-
web.groovymark@gmail.com
- December 2, 2024
Question 41
What does “incident response” refer to?
a) Monitoring network traffic
b) The actions taken to identify, contain, and recover from a security incident
c) A method for data encryption
d) A process for managing user accounts
Correct Answer: b) The actions taken to identify, contain, and recover from a security incident
Explanation: Incident response is critical for mitigating the impact of security breaches and restoring normal operations.
Question 42
What is “biometric authentication”?
a) A method of password management
b) Authentication based on unique physical characteristics, such as fingerprints or facial recognition
c) A type of encryption
d) A process for data backup
Correct Answer: b) Authentication based on unique physical characteristics, such as fingerprints or facial recognition
Explanation: Biometric authentication enhances security by using unique biological traits to verify an individual's identity.
Question 43
What does “insider threat” mean?
a) An external attack on a system
b) A threat that originates from within an organization
c) A method of data encryption
d) A type of software vulnerability
Correct Answer: b) A threat that originates from within an organization
Explanation: Insider threats involve individuals with access to sensitive information who may intentionally or unintentionally compromise security.
Question 44
What is a “security framework”?
a) A method for managing user accounts
b) A set of guidelines and best practices for managing security risks
c) A process for backing up data
d) A type of encryption
Correct Answer: b) A set of guidelines and best practices for managing security risks
Explanation: Security frameworks provide a structured approach for organizations to manage their cybersecurity risks effectively.
Question 45
What does “network segmentation” do?
a) Combines all network traffic into a single stream
b) Divides a network into smaller, manageable segments for improved security
c) Monitors network performance
d) A method for managing software licenses
Correct Answer: b) Divides a network into smaller, manageable segments for improved security
Explanation: Network segmentation enhances security by isolating different parts of the network, reducing the impact of a breach.
Question 46
What is “remote access”?
a) Accessing data from a local network
b) Connecting to a network from a remote location
c) A method of data encryption
d) A technique for managing user accounts
Correct Answer: b) Connecting to a network from a remote location
Explanation: Remote access allows users to connect to a network or system from outside its physical location, enhancing flexibility and mobility.
Question 47
What is “cloud computing”?
a) Storing data on local servers only
b) Accessing and storing data over the internet rather than on a local server
c) A method of data encryption
d) A process for data backup
Correct Answer: b) Accessing and storing data over the internet rather than on a local server
Explanation: Cloud computing enables users to access resources and services hosted on remote servers via the internet.
Question 48
What does “data governance” refer to?
a) Monitoring network traffic
b) Managing data availability, usability, integrity, and security within an organization
c) A process for backing up data
d) A method of encrypting information
Correct Answer: b) Managing data availability, usability, integrity, and security within an organization
Explanation: Data governance ensures that data is managed effectively and securely throughout its lifecycle.
Question 49
What is “endpoint protection”?
a) A method for monitoring network traffic
b) Security measures designed to protect devices connected to a network
c) A technique for data backup
d) A process for managing user accounts
Correct Answer: b) Security measures designed to protect devices connected to a network
Explanation: Endpoint protection focuses on securing devices such as computers, mobile phones, and other endpoints from threats.
Question 50
What does “business continuity planning” involve?
a) Developing software applications
b) Preparing for potential disruptions to ensure that essential functions continue during and after a crisis
c) A method for monitoring network traffic
d) A technique for data encryption
Correct Answer: b) Preparing for potential disruptions to ensure that essential functions continue during and after a crisis
Explanation: Business continuity planning aims to minimize the impact of disruptions and maintain critical operations during emergencies.