a) A method for monitoring network traffic b) Managing risks associated with social media use within an organization c) A type of malware d) A process for securing physical assets
Correct Answer: b) Managing risks associated with social media use within an organization
Explanation: Social media risk management helps organizations protect their reputation and sensitive information in online environments.
Question 42
What is “network segmentation”?
a) Dividing a computer network into smaller parts for improved security and performance b) A type of malware c) A method of data encryption d) A process for managing user accounts
Correct Answer: a) Dividing a computer network into smaller parts for improved security and performance
Explanation: Network segmentation enhances security by limiting the attack surface and containing potential threats.
Question 43
What does “cloud access security broker” (CASB) do?
a) A method for monitoring network traffic b) Acts as a security policy enforcement point between cloud service users and providers c) A type of malware d) A process for managing user accounts
Correct Answer: b) Acts as a security policy enforcement point between cloud service users and providers
Explanation: CASBs help organizations secure data in the cloud by providing visibility and control over cloud usage.
Question 44
What is “spear phishing”?
a) A general phishing attempt b) A targeted phishing attack aimed at a specific individual or organization c) A method of data backup d) A type of malware
Correct Answer: b) A targeted phishing attack aimed at a specific individual or organization
Explanation: Spear phishing is more sophisticated than regular phishing and often uses personal information to increase its chances of success.
Question 45
What does “cryptography” involve?
a) The process of monitoring network traffic b) Techniques for securing communication by encoding messages c) A type of malware d) A method of data backup
Correct Answer: b) Techniques for securing communication by encoding messages
Explanation: Cryptography is essential for protecting sensitive information and ensuring privacy in communications.
Question 46
What is “physical layer security”?
a) Security measures at the hardware level b) A method of data encryption c) A type of malware d) A process for managing user accounts
Correct Answer: a) Security measures at the hardware level
Explanation: Physical layer security protects data at the hardware level, preventing unauthorized access to physical devices.
Question 47
What does “system hardening” involve?
a) Increasing the performance of a system b) Securing a system by reducing its surface of vulnerability c) A method of data backup d) A type of malware
Correct Answer: b) Securing a system by reducing its surface of vulnerability
Explanation: System hardening enhances security by minimizing the potential attack vectors available to malicious actors.
Question 48
What is a “security breach”?
a) A minor software bug b) An incident where unauthorized access is gained to a system c) A method of data encryption d) A type of malware
Correct Answer: b) An incident where unauthorized access is gained to a system
Explanation: Security breaches can lead to data loss, theft, and reputational damage.
Question 49
What does “application security” refer to?
a) The practice of securing applications against threats b) A type of malware c) A method of data encryption d) A process for managing user accounts
Correct Answer: a) The practice of securing applications against threats
Explanation: Application security involves implementing measures to protect software applications from vulnerabilities and attacks.
Question 50
What is “digital forensics”?
a) The process of securing physical assets b) The practice of recovering and analyzing data from digital devices for investigations c) A method of data encryption d) A type of malware
Correct Answer: b) The practice of recovering and analyzing data from digital devices for investigations
Explanation: Digital forensics helps organizations investigate cyber incidents and gather evidence for legal proceedings.