Which of the following security controls can be used to limit access to certain servers hosted in the cloud service provider facility?
Select one:
a. Firewall
b. Intrusion Detection System
c. Network Monitoring System
d. Packet Analysis Tool
Securing the data centre with lock and closed-circuit television (CCTV) is an example of which security control category?
Select one:
a. Physical
b. Policy
c. Virtual
d. Technical
An attacker will take advantage of the easiest way to bypass the security controls implemented in an organisation. This is also known as the:
Select one:
a. Principle of Defense
b. Principle of Exploitation
c. Principle of the Least Privilege
d. The principle of the weakest link
Which of the following can help achieve the security goal of ensuring integrity?
Select one:
a. Intrusion Detection System
b. Firewall
c. Content Distribution Network
d. Digital Signature
Which of the following is not an example of Two-Factor Authentication (2FA)?
Select one:
a. The chip and PIN on a bank card
b. Hardware security token and password
c. Entering your password twice
d. A VPN token and password
One of the responsibilities of a security auditor is to
Select one:
a. Analyze logs and netflows for signs of attacks
b. Configure firewall rules
c. Ensure compliance to security policies
d. Write signatures for the intrusion detection system
Which of the following can mitigate the risk of identity theft attacks?
Select one:
a. Patch Management
b. Firewall
c. Intrusion Detection System
d. Two Factor Authentication
Which of the following entities is responsible for delegating Internet Protocol (IP) addresses and Autonomous System (AS) numbers to network operators?
Select one:
a. Domain Name Registrar
b. Law Enforcement Agencies
c. Regional Internet Registry
d. National Computer Emergency Response Team
Risks that are identified can be mitigated by which of the following activity?
Select one:
a. Monitoring network activities
b. Buying the latest security solutions
c. Performing risk assessment
d. Implementing countermeasures
What is the term used to describe the security property that means users cannot deny knowledge of sending a message or performing some online activity at some later point in time?
Select one:
a. Integrity
b. Confidentiality
c. Availability
d. Non-repudiation
This comment has been removed by the author.
ReplyDelete