Question 1
Which of the following are recommended AWS security best practices?
Question 2
What is the primary purpose of a Security Information and Event Management (SIEM) system?
Question 3
Which Azure service provides centralized identity and access management?
Question 4
Which cryptographic method is based on the difficulty of computing discrete logarithms in finite fields?
Question 5
What is the main goal of phishing?
Question 6
Which Azure service helps detect and respond to security threats across hybrid environments?
Question 7
What is the primary purpose of a Security Information and Event Management (SIEM) system?
Question 8
Which Microsoft service provides SIEM and SOAR capabilities?
Question 9
What does Zero Trust security assume?
Question 10
What is phishing primarily designed to do?
Question 11
What type of attack involves tricking users into revealing sensitive information?
Question 12
The TLS/SSL protocols secure an individual connection between a client and a server, at what layer of the OSI (Open Systems Interconnection) model are TLS/SSL situated?
Question 13
What is the primary role of Microsoft Defender for Endpoint?
Question 14
Which AWS services or features can be used to detect anomalous or malicious activity in an AWS account?
Question 15
Which Microsoft tool helps protect endpoints against malware and advanced threats?
Question 16
Which techniques help protect data at rest?
Question 17
What is the primary purpose of a Security Information and Event Management (SIEM) system?
Question 18
In Google Cloud, what is the preferred way to grant a VM access to other GCP services securely without managing long-lived keys?
Question 19
In AWS, which actions align with IAM security best practices?
Question 20
What does the Zero Trust security model assume?