Question 1
Why are regular software updates and patches important?
Question 2
Which of the following best describes a Zero Trust security model?
Question 3
What is the primary benefit of log normalization in a SIEM solution?
Question 4
What is the role of the MITRE ATT&CK framework in cybersecurity operations?
Question 5
Which Security Protocol operates on the Internet layer?
Question 6
Which of the following is the most effective method to protect against phishing attacks?
Question 7
Which cybersecurity framework is widely used for risk management?
Question 8
What is NOT a valid statement on Transport Layer Security / Secure Sockets Layer (TLS/SSL)?
Question 9
Which of the following is a common post-exploitation technique used by attackers to maintain persistence?
Question 10
What is Shoulder Surfing ?
Question 11
Which protocol is commonly used for secure file transfer over the internet?
Question 12
Which security measure is most effective at preventing eavesdropping on wireless networks?
Question 13
Which security threat involves corrupting DNS entries to redirect users to malicious websites?
Question 14
What are zero-day vulnerabilities?
Question 15
What is the best solution to guarantee security in Client / Server applications?
Question 16
In Active Directory, what is the function of a Read-Only Domain Controller (RODC)?
Question 17
What is decentralized identity?
Question 18
Why is integrating threat intelligence feeds into SIEM beneficial?
Question 19
Which term describes the practice of testing a system for vulnerabilities before an attacker can exploit them?
Question 20
Which one of the following refers to the technique used for verifying the integrity of the message?