El Preguntas Flashcards
What is the primary goal of a security baseline?
A. To establish a minimum level of security for all systems
B. To identify vulnerabilities in existing systems
C. To provide a framework for incident response
D. To ensure compliance with industry regulations
A. To establish a minimum level of security for all systems
Which of the following is NOT a fundamental principle of the Zero Trust model?
A. Never trust, always verify
B. Assume breach
C. Least privilege access
D. Open access
D. Open access
What is the primary purpose of a firewall?
A. To prevent unauthorized access to a network
B. To detect and block malware
C. To encrypt data in transit
D. To monitor network traffic for anomalies
A. To prevent unauthorized access to a network
What is the best practice for password management?
A. Using the same password for all accounts
B. Sharing passwords with colleagues
C. Using strong, unique passwords
D. Disabling password expiration
C. Using strong, unique passwords
What is the purpose of multi-factor authentication (MFA)?
A. To add an extra layer of security to login processes
B. To encrypt data at rest
C. To prevent unauthorized access to physical devices
D. To detect and block malware
A. To add an extra layer of security to login processes
Which of the following is a common network attack vector?
A. Phishing
B. SQL injection
C. Man-in-the-middle
D. All of the above
D. All of the above
What is the purpose of network segmentation?
A. To improve network performance
B. To reduce the attack surface
C. To increase network capacity
D. To simplify network management
B. To reduce the attack surface
What is the primary function of antivirus software?
A. To prevent unauthorized access to a network
B. To detect and remove malware
C. To encrypt data in transit
D. To monitor network traffic for anomalies
B. To detect and remove malware
What is the purpose of application whitelisting?
A. To allow only approved applications to run
B. To block all incoming network traffic
C. To encrypt data at rest
D. To detect and block malware
A. To allow only approved applications to run
What is the best practice for endpoint hardening?
A. Disabling automatic updates
B. Running as administrator
C. Using strong, unique passwords
D. All of the above
C. Using strong, unique passwords
What is the purpose of incident response planning?
A. To prevent security incidents
B. To respond to security incidents effectively
C. To identify vulnerabilities in systems
D. To ensure compliance with regulations
B. To respond to security incidents effectively
What is the role of a security information and event management (SIEM) system?
A. To prevent unauthorized access to a network
B. To detect and block malware
C. To collect, analyze, and correlate security events
D. To encrypt data in transit
C. To collect, analyze, and correlate security events
What is the shared responsibility model in cloud computing?
A. The cloud provider is responsible for all security
B. The customer is responsible for all security
C. The responsibility is shared between the cloud provider and the customer
D. There is no shared responsibility
C. The responsibility is shared between the cloud provider and the customer
What is the purpose of a cloud access security broker (CASB)?
A. To provide secure access to cloud applications
B. To encrypt data in the cloud
C. To detect and block malware in the cloud
D. To monitor cloud usage
A. To provide secure access to cloud applications
What is the purpose of a security audit?
A. To identify vulnerabilities in systems
B. To assess compliance with regulations
C. To prevent security incidents
D. To respond to security incidents
B. To assess compliance with regulations
Which of the following is a common security compliance framework?
A. ISO 27001
B. PCI DSS
C. HIPAA
D. All of the above
D. All of the above
What is the purpose of a security orchestration, automation, and response (SOAR) platform?
A. To automate security tasks
B. To detect and block malware
C. To encrypt data in transit
D. To monitor network traffic for anomalies
A. To automate security tasks
What is the difference between a vulnerability and an exploit?
A. A vulnerability is a weakness in a system, while an exploit is a tool used to take advantage of a vulnerability
B. A vulnerability is a tool used to take advantage of a weakness in a system, while an exploit is a weakness in a system
C. There is no difference between a vulnerability and an exploit
D. Both are tools used to prevent security incidents
A. A vulnerability is a weakness in a system, while an exploit is a tool used to take advantage of a vulnerability
What is the purpose of a security operations center (SOC)?
A. To prevent unauthorized access to a network
B. To detect and block malware
C. To monitor and respond to security threats
D. To encrypt data in transit
C. To monitor and respond to security threats
What is the role of artificial intelligence (AI) in cybersecurity?
A. To automate security tasks
B. To detect and block malware
C. To encrypt data in transit
D. All of the above
D. All of the above
Why are policies, standards, procedures, and guidelines important components of a baseline?
A. They define the roles and responsibilities of security team members
B. They provide a structured approach to security
C. They help to identify potential cyber threats
D. They ensure compliance with industry regulations
B. They provide a structured approach to security
How do policies, standards, procedures, and guidelines interact within a baseline model?
A. They are unrelated concepts
B. Policies are the most important component
C. They work together to create a comprehensive security framework
D. Procedures are the most important component
C. They work together to create a comprehensive security framework
Why is change management important in baseline management?
A. It helps to ensure that the baseline remains up-to-date
B. It defines the roles and responsibilities of security team members
C. It helps to identify potential cyber threats
D. It ensures compliance with industry regulations
A. It helps to ensure that the baseline remains up-to-date
What are some examples of baseline controls for Windows?
A. CIS, Windows security baselines, and Intune’s security baselines
B. Firewalls, intrusion detection systems, and antivirus software
C. Policies, standards, procedures, and guidelines
D. Change management processes
A. CIS, Windows security baselines, and Intune’s security baselines
What is the primary purpose of hardware-based security features in Windows?
A. To protect Windows from malware infections
B. To secure data from lost or stolen devices
C. To prevent unauthorized access to network resources
D. To ensure compliance with industry regulations
B. To secure data from lost or stolen devices
Why is supply chain security important when purchasing hardware?
A. To ensure that the hardware is compatible with Windows
B. To prevent the purchase of counterfeit hardware
C. To ensure that the hardware is properly certified
D. To reduce the cost of hardware purchases
C. To ensure that the hardware is properly certified
What is the role of VBS in hardware-based security?
A. It provides a secure environment for running applications
B. It is used to encrypt data at rest
C. It is used to authenticate users
D. It is used to detect and prevent malware infections
A. It provides a secure environment for running applications
What is System Guard used for?
A. To protect Windows from malware infections
B. To secure data from lost or stolen devices
C. To prevent unauthorized access to network resources
D. To ensure compliance with industry regulations
B. To secure data from lost or stolen devices
What are some hardware security recommendations and best practices?
A. Regularly update firmware and drivers
B. Use strong passwords and enable two-factor authentication
C. Keep hardware devices physically secure
D. All of the above
D. All of the above
What are the two primary models used in network communication?
A. OSI and TCP/IP
B. HTTP and HTTPS
C. TCP and UDP
D. DNS and DHCP
A. OSI and TCP/IP
Why is network baselining important for Windows devices?
A. To identify and mitigate potential security threats
B. To ensure compliance with industry regulations
C. To optimize network performance
D. All of the above
D. All of the above