Question 1
What is a “Brute-Force Attack”?
Question 2
Which of the following passwords is complex?
Question 3
Which AWS product is a frontier agent that proactively secures your applications throughout the development lifecycle across all your environments?
Question 4
Which tool in Microsoft Azure helps monitor security configurations and provides recommendations to protect cloud resources?
Question 5
Which well-known framework is used for exploiting vulnerabilities?
Question 6
Which cryptographic method is based on the difficulty of computing discrete logarithms in finite fields?
Question 7
The protocol QUIC standardized in RFC 9000 establishes connections faster and it is inherently secure as it mandates TLS 1.3, which underlying transport layer protocol does QUIC use?
Question 8
In Azure, which service provides centralized security posture management and threat protection?
Question 9
Which of the following is a common method used by attackers to exploit weak or default credentials?
Question 10
Which Azure feature allows secure storage and management of secrets, keys, and certificates?
Question 11
What type of attack involves tricking users into revealing sensitive information?
Question 12
What is a “Zero-Day Exploit”?
Question 13
In Microsoft Entra ID, which feature helps enforce MFA only when risk is detected (e.g., unfamiliar sign-in, leaked credentials)?
Question 14
The private communication of individuals and organizations is protected online by cryptography. Existing public-key cryptography (also known as asymmetric cryptography) is based on the difficulty of factoring and the difficulty of calculating elliptic curve discrete logarithms. It is expected that in the near furture these two problems will be readily and efficiently solved by what type of computing power?
Question 15
In AWS IAM, which practices reduce the risk of privilege escalation?
Question 16
Which approach is generally recommended for modern web APIs that need to authenticate third party clients?
Question 17
What is the primary purpose of a Security Information and Event Management (SIEM) system?
Question 18
What type of malware encrypts files and demands payment to restore access?
Question 19
What does Zero Trust security assume?
Question 20
When designing a zero-trust network architecture, which principles are fundamental?