Question 1
Which of the following is the most critical data source for a SIEM system to detect potential security threats?
Question 2
From the options below, which of them is not a threat to information security?
Question 3
Which type of attack exploits vulnerabilities in software to gain unauthorized access to a system?
Question 4
Microsoft Purview portal is used for what?
Question 5
What type of attack involves an attacker intercepting and altering communication between two parties?
Question 6
Where is Microsoft Sentinel storing collected data?
Question 7
What is the primary risk of using self-signed SSL/TLS certificates in a production environment?
Question 8
What is a commonly used hashing algorithm that produces a 256-bit digest?
Question 9
What is a common way to secure network traffic?
Question 10
What is the role of a Security Information and Event Management (SIEM) system?
Question 11
What is the purpose of a network firewall?
Question 12
What is a man-in-the-middle attack?
Question 13
Which FREE Azure resource can you use to filter network traffic between Azure resources in an Azure virtual network ?
Question 14
What does 'zero trust' architecture emphasize in network security?
Question 15
Which of the following is a common indicator of a compromised system?
Question 16
What is the main security concern when using default credentials on network devices?
Question 17
What does GDPR stand for?
Question 18
What are some of the passwordless authentication options available in Microsoft Entra ID?
Question 19
What is decentralized identity?
Question 20
What is the purpose of a honeytoken in cybersecurity?