Question 1
What is the primary purpose of Multi-Factor Authentication (MFA)?
Question 2
Which actions most effectively reduce the risk of successful phishing attacks against employees?
Question 3
What is the principle of least privilege?
Question 4
You need to ensure Azure Storage accounts are not publicly accessible over the internet. Which control best enforces this at scale?
Question 5
What is the primary purpose of a Security Information and Event Management (SIEM) system?
Question 6
Which practices together best illustrate a defense in depth approach for a web application?
Question 7
Which AWS service detects suspicious activity using machine learning?
Question 8
Which Azure service provides centralized identity and access management?
Question 9
What is the main goal of phishing?
Question 10
Which approach is generally recommended for modern web APIs that need to authenticate third party clients?
Question 11
Which characteristics distinguish a secure software supply chain?
Question 12
Which Microsoft solution helps protect identities by detecting risky sign-ins?
Question 13
Which command can be used to compute the NTLM hash of the password "Pa$$word" in a Linux shell?
Question 14
Which European Union Regulation is the toughest privacy and security law in the world and imposes obligations onto organizations anywhere, so long as they target or collect data related to people in the EU?
Question 15
Which type of malware disguises itself as legitimate software?
Question 16
Which of the following is not a type of peer-to-peer cyber-crime?
Question 17
Which AWS service is primarily used to manage user access and permissions for AWS resources?
Question 18
Which Azure service helps detect and respond to security threats across hybrid environments?
Question 19
A firewall is used to control incoming and outgoing network traffic based on predefined security rules.
Question 20
Which AWS service provides centralized logging of API calls for auditing and compliance?