Cybersecurity Assessment
What validates the integrity of data files?
Hashing
what is the term for the policies and technologies implemented to protect, limit, monitor, audit, and govern identities with access to sensitive data and resources?
Identity and access management (IAM)
According to the shared responsibility model, which cloud computing model places the most responsibility on the cloud service provider (CSP)?
Platform as a Service (PaaS)
Which option removes the risk of multitenancy in cloud computing?
Private Cloud
Which option describes the best defense against collusion?
Separation of duties and job rotation
Packet sniffer is also called _
protocol analyzer
Which option describes testing that individual software developers can conduct on their own code?
unit testing
Which area is DMZ?
2
Which security control can best protect against shadow IT by identifying and preventing use of unsanctioned cloud apps and services?
Cloud Access Security Broker (CASB)
Which option tests code while it is in operation?
Dynamic Analysis
In black box penetration testing, what information is provided to the tester about the target environment?
None
Which aspect of cybersecurity do Distributed Denial of Service (DDoS) attacks affect the most?
Availability
Which is an example of privacy regulation at the state government level in the U.S.?
CCPA
You need to recommend a solution to automatically assess your cloud-hosted VMs against CIS benchmarks to identify deviations from security best practices. What type of solution should you recommend?
Cloud Security Posture Management (CSPM)
What is the difference between DRP and BCP?
DRP works to keep a business up and running despite a disaster. BCP works to restore the original business capabilities.
Your organization recently implemented a unified messaging solution and VoIP phones on every desktop. You are responsible for researching the vulnerabilities of the VoIP system. Which type of attack are VoIP phones most vulnerable to experiencing?
Denial of Service (DoS)
Which security control cannot produce an active response to a security event?
Intrusion Detection System (IDS)
During a penetration test, you find a file containing hashed passwords for the system you are attempting to breach. Which type of attack is most likely to succeed in accessing the hashed passwords in a reasonable amount of time?
Rainbow Table Attack
You configure an encrypted USB drive for a user who needs to deliver a sensitive file at an in-person meeting. What type of encryption is typically used to encrypt the file?
Symmetric Encryption