Questions
The answers to the questions can be found in the Assessments section at the end of this book.
The following is a short list of review questions to help reinforce your learning and help you identify which areas require some improvement:
- If a threat actor is able to intercept network traffic and gather usernames and passwords, which of the following is affected?
A. Confidentiality
B. Availability
C. Integrity
D. Hashing
- How can you protect data at rest?
A. Save it offline.
B. With encryption.
C. Hide it.
D. Keep it on the cloud.
- Which of the following technologies is used to provide integrity?
A. Anti-malware protection
B. Firewall
C. Encryption
D. Hashing
- Which of the following best describes a weakness in a system?
A. Exploit
B. Risk
C. Vulnerability
D. Threat
- Which of the following is a component of a Security Operation Center (SOC) runbook?
A. Workflow
B. Tools
C. Processes
D. All of the above
- Which standard provides risk management guidelines?
A. ISO 27001
B....