Question 1
Which of the following statements is correct about the firewall?
Question 2
What is the primary purpose of a Security Information and Event Management (SIEM) system?
Question 3
What are effective controls for reducing the impact of ransomware in enterprise environments?
Question 4
Which technology is used to segment networks and increase security?
Question 5
Which Microsoft solution provides SIEM and SOAR capabilities?
Question 6
What is the main goal of phishing?
Question 7
Which AWS services or features can be used to detect anomalous or malicious activity in an AWS account?
Question 8
What is the principle of least privilege?
Question 9
Which security model enforces access control based on user roles?
Question 10
Which AWS service helps protect applications from web exploits like SQL injection?
Question 11
Which approach is generally recommended for modern web APIs that need to authenticate third party clients?
Question 12
"Which command can be used to compute the NTLM hash of the password ""Pa$$word"" in a Linux shell?"
Question 13
Which Azure service provides centralized identity and access management?
Question 14
In Microsoft Active Directory, which attack techniques specifically target Kerberos authentication?
Question 15
Which of the following are recommended AWS security best practices?
Question 16
Threat management is a process that is used by cybersecurity professionals to prevent cyberattacks, detect cyberthreats and respond to security incidents. Many modern threat management systems use frameworks that provide comprehensive guidance to improve information security and cybersecurity risk management for private sector organizations. Which Framework is plublished by the NIST and consists of guides, standards, best practices and five core functions, namely to identify, protect, detect, respond and recover?
Question 17
What AWS service is mainly used to manage identities and permissions?
Question 18
What does Zero Trust security assume?
Question 19
Which control helps prevent unauthorized access after employee termination?
Question 20
Which Azure service provides centralized security posture management and threat protection recommendations across Azure resources?