Question 1
What is the most secure way to allow an Azure VM to access an Azure Key Vault secret without storing credentials on the VM?
Question 2
Threat management is a process that is used by cybersecurity professionals to prevent cyberattacks, detect cyberthreats and respond to security incidents. Many modern threat management systems use frameworks that provide comprehensive guidance to improve information security and cybersecurity risk management for private sector organizations. Which Framework is plublished by the NIST and consists of guides, standards, best practices and five core functions, namely to identify, protect, detect, respond and recover?
Question 3
Which of the following represents a social engineering attack?
Question 4
In Azure networking, which service helps protect web applications from common exploits like SQL injection and XSS at Layer 7?
Question 5
Which actions most effectively reduce the risk of successful phishing attacks against employees?
Question 6
Which indicators most strongly suggest a system has been compromised by a rootkit?
Question 7
Which technology is used to segment networks and increase security?
Question 8
A firewall is used to control incoming and outgoing network traffic based on predefined security rules.
Question 9
In AWS, which service is used to detect malicious activity and unauthorized behavior?
Question 10
Which are examples of applying the principle of least privilege to human service identities?
Question 11
You need to ensure Azure Storage accounts are not publicly accessible over the internet. Which control best enforces this at scale?
Question 12
Which Microsoft tool helps protect endpoints against malware and advanced threats?
Question 13
Which European Union Regulation is the toughest privacy and security law in the world and imposes obligations onto organizations anywhere, so long as they target or collect data related to people in the EU?
Question 14
Which Azure service is primarily used to manage identities and access to cloud resources?
Question 15
What is the main goal of phishing?
Question 16
In Amazon Web Services, which service detects threats and anomalies?
Question 17
Which attack involves overwhelming a system with traffic to make it unavailable?
Question 18
In AWS, what is the main security benefit of using Security Groups?
Question 19
What is the purpose of the concept of “defense in depth”?
Question 20
In public key infrastructure (PKI), which factors most directly impact the trustworthiness of a digital certificate?