Question 1
What is Multi-Factor Authentication (MFA)?
Question 2
The TLS/SSL protocols secure an individual connection between a client and a server, at what layer of the OSI (Open Systems Interconnection) model are TLS/SSL situated?
Question 3
What is a zero-trust security model based on?
Question 4
What is encryption at rest?
Question 5
Which Microsoft 365 feature is used to prevent sensitive information from being shared?
Question 6
When designing a zero-trust network architecture, which principles are fundamental?
Question 7
Which AWS service is specifically designed to help you monitor and manage security and compliance across your AWS infrastructure?
Question 8
A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
Question 9
What is the main benefit of Role-Based Access Control (RBAC)?
Question 10
What is a “Zero-Day Exploit”?
Question 11
Which well-known framework is used for exploiting vulnerabilities?
Question 12
Which Microsoft service is primarily used for Cloud Access Security Broker (CASB) capabilities (app discovery, session control, SaaS governance)?
Question 13
Which AWS services or features can be used to detect anomalous or malicious activity in an AWS account?
Question 14
Which Azure service is primarily used to manage identities and access to cloud resources?
Question 15
In Microsoft Azure, which combination best strengthens identity security for administrators?
Question 16
What is the primary purpose of a Security Information and Event Management (SIEM) system?
Question 17
Threat management is a process that is used by cybersecurity professionals to prevent cyberattacks, detect cyberthreats and respond to security incidents. Many modern threat management systems use frameworks that provide comprehensive guidance to improve information security and cybersecurity risk management for private sector organizations. Which Framework is plublished by the NIST and consists of guides, standards, best practices and five core functions, namely to identify, protect, detect, respond and recover?
Question 18
Which Microsoft service provides SIEM and SOAR capabilities?
Question 19
You want to detect and respond to security incidents by correlating logs across Microsoft 365, Azure, and third-party sources. Which solution is designed for this?
Question 20
What type of malware encrypts files and demands payment to restore access?