Security Architecture Flashcards

1
Q

Which cloud model combines both on-premises and cloud resources, requiring shared security responsibilities?

a) Private Cloud
b) Hybrid Cloud
c) Public Cloud
d) Community Cloud

A

Answer: b) Hybrid Cloud

A hybrid cloud combines both on-premises and cloud resources, allowing an organization to balance cost, scalability, and control. Security responsibilities are shared between the cloud provider and the organization, which must secure its on-premises infrastructure while also relying on the cloud provider’s security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary benefit of Infrastructure as Code (IaC) in a cloud environment?

a) It allows for physical security controls over cloud servers
b) It automates the deployment and configuration of infrastructure
c) It provides a centralized logging system for cloud services
d) It replaces virtualization with on-premises hardware

A

Answer: b) It automates the deployment and configuration of infrastructure

Infrastructure as Code (IaC) allows administrators to write scripts or configuration files to automatically set up and manage infrastructure. This reduces manual configuration errors and speeds up deployment, making cloud environments more efficient and scalable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is not a responsibility shared between a cloud service provider and a customer?

a) Data encryption
b) Application security
c) Network traffic monitoring
d) Hardware maintenance

A

Answer: d) Hardware maintenance

The cloud provider is responsible for maintaining the physical hardware (e.g., servers, data centers), while the customer is responsible for data encryption, application security, and monitoring network traffic based on the shared responsibility model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What security risk is introduced when using third-party vendors in cloud services?

a) Increased network congestion
b) Reduced need for authentication controls
c) A potential supply chain attack vector
d) Improved infrastructure security

A

Answer: c) A potential supply chain attack vector

Using third-party vendors introduces the risk of supply chain attacks, where attackers compromise a vendor to gain access to the primary organization’s network or data. Organizations must assess vendor security policies to mitigate this risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a key security risk associated with Internet of Things (IoT) devices?

a) They are always encrypted by default
b) They often lack built-in security features
c) They do not require network connections
d) They automatically update with security patches

A

Answer: b) They often lack built-in security features

IoT devices, such as smart thermostats and wearable health monitors, often have weak security, including default credentials, lack of encryption, and infrequent security patches, making them prime targets for attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company wants to run an application without managing servers or worrying about infrastructure. Which cloud service model should they use?

a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Function as a Service (FaaS)
d) Software as a Service (SaaS)

A

Answer: c) Function as a Service (FaaS)

FaaS, also known as serverless computing, allows developers to deploy code that automatically runs when triggered, without managing the underlying infrastructure. This reduces overhead and maintenance costs, as the cloud provider manages the infrastructure and execution environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which network security technique uses software instead of hardware to manage traffic flows?

a) Logical segmentation
b) Software-Defined Networking (SDN)
c) Physical isolation
d) Microservices

A

Answer: b) Software-Defined Networking (SDN)

Explanation:
SDN separates network control from hardware by using software-based controllers to dynamically route traffic. This allows for more flexibility, automation, and centralized network management, improving efficiency and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network administrator needs to isolate a critical database server from the rest of the network to prevent external access. What security measure should they implement?

a) Logical segmentation
b) Air gapping
c) Microservices
d) Virtualization

A

Answer: b) Air gapping

Explanation:
An air-gapped system is physically isolated from other networks, meaning no direct network connection exists between the secured system and external devices. This is commonly used for highly sensitive environments, such as government or industrial control systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company is moving to a centralized network infrastructure. Which of the following is an advantage of this approach?

a) Reduced risk of a single point of failure
b) Faster response time to security threats
c) Increased availability across multiple locations
d) No need for centralized authentication

A

Answer: b) Faster response time to security threats

Explanation:
A centralized infrastructure consolidates network control, allowing faster incident response, easier management, and centralized enforcement of security policies. However, it is more prone to single points of failure than a decentralized model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What security advantage does virtualization provide in modern data centers?

a) It eliminates the need for backups
b) It allows for better resource isolation between virtual machines
c) It replaces the need for network firewalls
d) It completely prevents unauthorized access

A

Answer: b) It allows for better resource isolation between virtual machines

Explanation:
Virtualization improves security by isolating virtual machines (VMs) from one another, preventing a compromised VM from affecting others on the same physical hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary benefit of containerization in modern applications?

a) It provides complete network segmentation
b) It isolates applications from the underlying operating system
c) It allows multiple operating systems to run on a single hypervisor
d) It requires fewer security updates than traditional applications

A

Answer: b) It isolates applications from the underlying operating system

Explanation:
Containerization allows applications to run in isolated environments without dependencies on the underlying OS. This increases portability, security, and scalability, making it ideal for cloud-based deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A manufacturing company uses an industrial control system (ICS) to manage operations. Which of the following is a major security concern for ICS environments?

a) ICS networks are always encrypted
b) They often use legacy, unpatched software
c) ICS devices do not require authentication
d) ICS environments are not connected to the internet

A

Answer: b) They often use legacy, unpatched software

Explanation:
Many ICS and SCADA systems run outdated, vulnerable software and cannot be patched easily due to their critical role in industrial processes, making them a prime target for attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A financial institution is migrating its customer data and banking applications to the cloud. The security team is concerned about ensuring compliance with data protection regulations while minimizing infrastructure costs.
Which cloud model would best suit this organization while keeping the most control over sensitive data?

a) Public Cloud
b) Private Cloud
c) Hybrid Cloud
d) Community Cloud

A

Answer: c) Hybrid Cloud

Explanation:
A hybrid cloud allows the institution to store sensitive customer data on-premises while leveraging cloud computing for scalable applications and processing power. This approach ensures compliance with financial regulations while minimizing infrastructure costs by utilizing cloud resources as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company has migrated to a serverless architecture to improve scalability and reduce operational costs. However, the security team is concerned about protecting sensitive customer data processed in this environment.
Which of the following should be the highest priority security control in a serverless model?

a) Hardening the operating system
b) Implementing firewall rules on the underlying infrastructure
c) Encrypting data at rest and in transit
d) Restricting access to the physical servers hosting the functions

A

Answer: c) Encrypting data at rest and in transit

Explanation:
Since serverless architecture abstracts the underlying infrastructure, traditional OS hardening and firewall rules are not controlled by the customer. Instead, the focus should be on securing data by encrypting it both at rest and in transit, ensuring confidentiality even if the cloud environment is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network administrator is responsible for designing a high-availability infrastructure for a government agency that processes large amounts of data. The agency requires a resilient system that can quickly recover in case of a failure. Which of the following configurations would best meet this requirement?

a) A single data center with redundant power supplies
b) A hot site that replicates all data and applications in real-time
c) A cold site with backup servers that can be brought online within 24 hours
d) A cloud-based solution with a single geographic region deployment

A

Answer: b) A hot site that replicates all data and applications in real-time

Explanation:
A hot site provides an immediate failover option with real-time replication, ensuring minimal downtime in case of disaster recovery scenarios. This is the best choice for government agencies requiring high availability and resilience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following describes the primary security risk associated with using microservices in cloud-based applications?

a) Increased attack surface due to multiple API endpoints
b) Lack of encryption support for individual services
c) Inability to scale services independently
d) Reduced application performance compared to monolithic applications

A

Answer: a) Increased attack surface due to multiple API endpoints

Explanation:
Microservices break applications into smaller, independent functions, each with its own API endpoint. This increases the attack surface since each service requires proper authentication, encryption, and monitoring to prevent unauthorized access or API-based attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An industrial manufacturing company relies on Supervisory Control and Data Acquisition (SCADA) systems to manage critical operations. The company recently suffered a denial-of-service (DoS) attack that disrupted production.
What is the best security measure to prevent similar attacks in the future?

a) Implementing network segmentation to isolate SCADA systems
b) Replacing SCADA systems with general-purpose IT servers
c) Requiring all SCADA operators to use multi-factor authentication
d) Disabling encryption to reduce processing overhead on SCADA devices

A

Answer: a) Implementing network segmentation to isolate SCADA systems

Explanation:
SCADA systems should be isolated from corporate and internet-facing networks to prevent unauthorized access. Network segmentation reduces the attack surface and prevents DoS attacks from spreading beyond their intended target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A cybersecurity analyst is investigating suspicious traffic on an air-gapped system used for research and development. However, they notice data exfiltration attempts despite the physical separation of the network.
Which of the following is the most likely attack vector?

a) Zero-day malware targeting the hypervisor
b) Covert radio frequency (RF) communication
c) A software misconfiguration in the cloud security gateway
d) A firewall misconfiguration allowing unauthorized remote access

A

Answer: b) Covert radio frequency (RF) communication

Explanation:
Even air-gapped systems are vulnerable to covert communication channels such as RF signals, electromagnetic emissions, or ultrasonic sound waves. Attackers can use malicious firmware or compromised USB devices to send data via radio waves to a nearby receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company is evaluating its cloud security model and is concerned about managing identity and access control across multiple cloud providers.
Which of the following security solutions would best address this concern?

a) Implementing single sign-on (SSO) with federated identity management
b) Deploying additional firewalls at the network perimeter
c) Using microservices to enforce user authentication at each cloud endpoint
d) Moving all workloads to a single cloud provider

A

Answer: a) Implementing single sign-on (SSO) with federated identity management

Explanation:
SSO with federated identity management allows users to access multiple cloud services with a single authentication mechanism, improving security and convenience while reducing password sprawl.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company is designing a highly available cloud-based service and wants to prevent a single point of failure while maintaining cost efficiency.
Which of the following deployment models is the best choice?

a) Hosting all resources in a single data center
b) Using a multi-region cloud deployment with load balancing
c) Implementing a cold site with manually deployed backups
d) Configuring a single high-performance server with RAID storage

A

Answer: b) Using a multi-region cloud deployment with load balancing

Explanation:
A multi-region cloud deployment ensures that even if one region fails, traffic is automatically rerouted to another location. Load balancing distributes requests efficiently, improving redundancy and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company is concerned about the security risks associated with third-party vendors that have access to its network.
Which of the following is the most effective way to mitigate this risk?

a) Implement a Zero Trust Architecture and enforce least privilege for third-party accounts
b) Require third-party vendors to sign a Non-Disclosure Agreement (NDA)
c) Install a hardware firewall to block traffic from vendor IPs
d) Encrypt all outbound traffic from third-party vendor connections

A

Answer: a) Implement a Zero Trust Architecture and enforce least privilege for third-party accounts

Explanation:
Third-party vendors introduce supply chain risks. Zero Trust Architecture (ZTA) assumes that no entity (internal or external) is inherently trusted and requires continuous authentication and least privilege access, which limits vendor access to only what is absolutely necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A hospital is using a Supervisory Control and Data Acquisition (SCADA) system to manage its power and water supply. The IT team is concerned about the system’s security vulnerabilities.
Which of the following is the best approach to secure SCADA systems?

a) Apply regular system patches and firmware updates
b) Implement air gapping and network segmentation
c) Migrate SCADA systems to a public cloud for better security management
d) Replace SCADA systems with virtualized IT servers

A

Answer: b) Implement air gapping and network segmentation

Explanation:
SCADA systems are highly sensitive and should not be directly accessible from corporate or public networks. Air gapping (isolating systems physically) and network segmentation prevent attackers from accessing these systems through common attack vectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A software development company needs a flexible cloud environment that allows for rapid deployment of applications without managing underlying infrastructure.
Which cloud service model would best meet these requirements?

a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) On-premises data center

A

Answer: b) Platform as a Service (PaaS)

Explanation:
PaaS provides a managed application development environment, allowing developers to deploy, test, and scale applications without worrying about infrastructure management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is a major security risk of embedded systems in Internet of Things (IoT) devices?

a) They require frequent software updates
b) They are difficult to patch and lack security updates
c) They do not use standard networking protocols
d) They are designed with strong encryption by default

A

Answer: b) They are difficult to patch and lack security updates

Explanation:
Many IoT and embedded systems are built with proprietary software and hardware that does not receive regular security patches, making them vulnerable to exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A government contractor is working with highly classified data and must ensure that data is not accessible from unsecured devices or unauthorized users.
Which of the following best meets this requirement?

a) Implement a role-based access control (RBAC) model
b) Deploy a mandatory access control (MAC) model
c) Use a discretionary access control (DAC) model
d) Require multi-factor authentication (MFA) for all users

A

Answer: b) Deploy a mandatory access control (MAC) model

Explanation:
MAC is the strictest access control model, where access is predefined and enforced by administrators based on security classification levels (e.g., Top Secret, Secret, Confidential). It is widely used in government and military environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A security engineer is setting up multi-region redundancy for a cloud-based application to improve availability.
What is the main benefit of this setup?

a) It reduces network traffic congestion
b) It eliminates the need for backups
c) It ensures service uptime even during regional failures
d) It replaces the need for encryption in transit

A

Answer: c) It ensures service uptime even during regional failures

Explanation:
Multi-region redundancy means that if one data center fails, another region automatically takes over, ensuring high availability and business continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A cybersecurity team is concerned about lateral movement attacks in a data center environment.
Which of the following would best help prevent attackers from moving laterally across the network?

a) Implement network segmentation and zero trust architecture
b) Increase firewall rules to block all incoming traffic
c) Migrate all services to a centralized data center
d) Require stronger passwords for all employees

A

Answer: a) Implement network segmentation and zero trust architecture

Explanation:
Network segmentation isolates different zones within the network, reducing an attacker’s ability to move laterally. Zero Trust Architecture ensures that every request is continuously validated, further limiting unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A healthcare company wants to ensure compliance with HIPAA regulations while using cloud storage for patient records.
Which security measure is most important to meet this compliance requirement?

a) Encrypt all stored data and implement access controls
b) Store all patient records in a public cloud
c) Require employees to sign NDAs before accessing data
d) Use firewalls to block unauthorized IP addresses

A

Answer: a) Encrypt all stored data and implement access controls

Explanation:
HIPAA compliance requires data encryption, strict access controls, and audit logging to protect patient information from unauthorized access or breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A large enterprise wants to segment its internal network so that certain departments, such as finance and human resources, cannot directly communicate with the development team’s infrastructure. The security team wants to limit internal threats while maintaining network efficiency.
Which of the following is the best method to accomplish this?

a) Use firewalls to block all inter-departmental traffic
b) Implement logical segmentation using VLANs and access controls
c) Configure air-gapped networks for each department
d) Require multi-factor authentication (MFA) for all inter-department communication

A

Answer: b) Implement logical segmentation using VLANs and access controls

Explanation:
Logical segmentation via VLANs and access controls allows departments to be isolated from one another while still being part of the same network infrastructure. Unlike firewalls, which primarily control external access, VLANs allow internal segmentation without adding unnecessary complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A security team wants to reduce the attack surface of their organization’s network by limiting exposure to external threats while still allowing employees to access the internet for business-related tasks.
Which security mechanism would be most effective in achieving this?

a) Configure proxy servers for all outbound internet traffic
b) Deploy air-gapped networks for employee workstations
c) Require IPSec VPN tunnels for all external connections
d) Implement jump servers for employee web browsing

A

Answer: a) Configure proxy servers for all outbound internet traffic

Explanation:
A proxy server acts as an intermediary between employees and the internet, allowing traffic filtering, logging, and anonymization. This helps reduce exposure to external threats by controlling what users can access and blocking malicious domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A data center implements a fail-open configuration for its fire suppression system to ensure that if a failure occurs, the fire doors will remain unlocked for quick evacuation.
What is the primary security risk associated with a fail-open system?

a) Increased physical security vulnerabilities
b) Lack of data redundancy in case of system failure
c) Risk of network downtime in case of a cyberattack
d) Increased authentication failures on access control systems

A

Answer: a) Increased physical security vulnerabilities

Explanation:
A fail-open system prioritizes safety but can create physical security risks by allowing unauthorized access if security doors remain unlocked during a failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A security administrator needs to monitor network traffic for potential intrusions and malicious activities but does not want to interfere with real-time network traffic flow.
Which of the following would be the best security solution?

a) Intrusion Prevention System (IPS)
b) Next-Generation Firewall (NGFW)
c) Intrusion Detection System (IDS)
d) Web Application Firewall (WAF)

A

Answer: c) Intrusion Detection System (IDS)

Explanation:
An IDS is a passive monitoring system that detects threats without disrupting normal network operations, unlike an IPS, which actively blocks threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A security analyst is investigating a highly sophisticated cyberattack that bypassed the company’s firewalls and antivirus software. The attack appears to have originated from an employee’s personal laptop connected to the corporate network.
Which of the following best describes this security incident?

a) Supply Chain Attack
b) Insider Threat
c) Zero-Day Exploit
d) Bring Your Own Device (BYOD) Risk

A

Answer: d) Bring Your Own Device (BYOD) Risk

Explanation:
Personal laptops often lack corporate security controls, making them a vulnerable attack vector if connected to the company network. BYOD risks can lead to malware infections and data exfiltration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A large online retailer needs to distribute incoming web traffic efficiently across multiple application servers to prevent overloading a single resource.
Which security device is best suited for this task?

a) Proxy Server
b) Load Balancer
c) Network Tap
d) Next-Generation Firewall (NGFW)

A

Answer: b) Load Balancer

Explanation:
A load balancer ensures that traffic is evenly distributed across multiple servers, preventing performance bottlenecks and improving reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A security engineer is setting up a jump server to allow administrators to securely connect to critical systems in a segmented network zone.
Which of the following best describes the purpose of a jump server?

a) To act as a firewall between network zones
b) To provide a secure gateway for accessing restricted environments
c) To store authentication credentials for privileged accounts
d) To prevent users from connecting to the internet

A

Answer: b) To provide a secure gateway for accessing restricted environments

Explanation:
A jump server is a controlled access point that allows authorized administrators to connect to isolated security zones securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A financial services company needs to allow secure remote access to its internal resources for employees working from home. The company wants to ensure all employee internet traffic is encrypted and routed through corporate security controls.
Which of the following is the best VPN configuration to achieve this?

a) Split-Tunnel VPN
b) Full-Tunnel VPN
c) Site-to-Site VPN
d) IPSec Transport Mode

A

Answer: b) Full-Tunnel VPN

Explanation:
A Full-Tunnel VPN forces all internet traffic to pass through the company’s secured infrastructure, ensuring that even external internet access is monitored and encrypted, reducing security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A company wants to enhance its web application security to protect against SQL injection, cross-site scripting (XSS), and other web-based attacks.
Which type of firewall would be most effective in this case?

a) Next-Generation Firewall (NGFW)
b) Layer 4 Firewall
c) Web Application Firewall (WAF)
d) Unified Threat Management (UTM)

A

Answer: c) Web Application Firewall (WAF)

Explanation:
A WAF is designed specifically to inspect web application traffic and block attacks such as SQL injection and XSS, which traditional firewalls cannot detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A cloud provider offers a security service that combines firewalls, VPNs, cloud access security brokers (CASBs), and SD-WAN technology into a single security solution for distributed enterprises.
Which of the following best describes this security model?

a) Secure Access Service Edge (SASE)
b) Next-Generation Firewall (NGFW)
c) Infrastructure as a Service (IaaS)
d) Software-Defined Networking (SDN)

A

Answer: a) Secure Access Service Edge (SASE)

Explanation:
SASE is a modern security model that integrates networking and security services into a cloud-delivered solution, ensuring secure connectivity across distributed environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A security analyst is reviewing logs from a Unified Threat Management (UTM) device and notices multiple failed login attempts from a foreign IP address.
Which feature of the UTM should they enable to automatically block these repeated attempts?

a) Next-Generation Firewall (NGFW)
b) Anomaly-based Intrusion Prevention System (IPS)
c) Web Application Firewall (WAF)
d) Secure Access Service Edge (SASE)

A

Answer: b) Anomaly-based Intrusion Prevention System (IPS)

Explanation:
An anomaly-based IPS detects unusual behavior, such as repeated login attempts, and can automatically block the suspicious IP, preventing further unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A finance company needs to ensure that all employee workstations are only able to connect to approved company applications and services while blocking all unapproved internet traffic.
Which of the following security controls would be most effective?

a) Network Tap
b) Layer 7 Firewall
c) Port Security
d) Site-to-Site VPN

A

Answer: b) Layer 7 Firewall

Explanation:
A Layer 7 firewall operates at the application layer, allowing it to filter traffic based on specific applications and services, ensuring that employees only access approved resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A company uses 802.1X authentication to ensure that only authorized devices can connect to the corporate network.
What security framework does 802.1X rely on for authentication?

a) Kerberos
b) Extensible Authentication Protocol (EAP)
c) Security Assertion Markup Language (SAML)
d) Challenge-Handshake Authentication Protocol (CHAP)

A

Answer: b) Extensible Authentication Protocol (EAP)

Explanation:
802.1X enforces network access control by using EAP authentication, often with RADIUS servers, to verify device legitimacy before granting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A cloud-based company is implementing Software-Defined Wide Area Networking (SD-WAN) to manage its global network traffic.
What is the primary benefit of SD-WAN?

a) It replaces the need for physical security devices
b) It improves network performance and security across multiple locations
c) It encrypts all internal communications between cloud services
d) It eliminates the need for VPNs

A

Answer: b) It improves network performance and security across multiple locations

Explanation:
SD-WAN optimizes network traffic routing across different locations, improving performance, security, and cost-efficiency, especially in cloud-based environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A university provides public Wi-Fi access for students and faculty, but wants to prevent unauthorized users from accessing the main network.
Which network segmentation technique is best for this?

a) Port Security
b) Guest Wi-Fi VLAN
c) Air-Gapped Network
d) Firewall Allow List

A

Answer: b) Guest Wi-Fi VLAN

Explanation:
A guest Wi-Fi VLAN separates public traffic from internal traffic, ensuring that unauthorized users cannot access the university’s main network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A cybersecurity team is implementing fail-closed security measures on critical systems.
What is the primary risk of using fail-closed security mechanisms?

a) Systems will become permanently inaccessible
b) Critical services may be unavailable during a failure
c) Attackers can bypass the security control
d) Fail-closed mechanisms allow unauthorized access

Answer: b) Critical services may be unavailable during a failure

A

A fail-closed security mechanism blocks all access if a failure occurs, which improves security but can cause downtime if critical services become inaccessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A government agency needs to prevent data leakage and unauthorized access to classified networks. They want to completely separate these networks from external communication channels.
Which security control is best for this scenario?

a) Jump Server
b) Network Address Translation (NAT)
c) Air-Gapped Network
d) Site-to-Site VPN

A

Answer: c) Air-Gapped Network

Explanation:
An air-gapped network is physically isolated, meaning no direct connectivity exists between the secured network and external networks, ensuring maximum protection against data exfiltration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A corporate IT team is implementing 802.1X authentication for their wired network.
Which of the following components is required for 802.1X to function properly?

a) Web Application Firewall (WAF)
b) RADIUS Server
c) Load Balancer
d) Secure Access Service Edge (SASE)

A

Answer: b) RADIUS Server

Explanation:
802.1X authentication uses a RADIUS server to verify device credentials before granting network access, ensuring only authorized devices can connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A company wants to enhance VPN security by encrypting both the payload and header of network packets during transmission.
Which VPN mode should they use?

a) Transport Mode
b) Tunnel Mode
c) Full-Tunnel VPN
d) Split-Tunnel VPN

A

Answer: b) Tunnel Mode

Explanation:
IPSec Tunnel Mode encrypts both the payload and header of network packets, ensuring maximum security for VPN communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A cybersecurity analyst notices that a Web Application Firewall (WAF) is blocking an excessive number of legitimate user requests.
What is the best way to address this issue?

a) Disable the WAF
b) Adjust WAF rules and sensitivity settings
c) Replace the WAF with a traditional firewall
d) Implement a load balancer

A

Answer: b) Adjust WAF rules and sensitivity settings

Explanation:
Overly strict WAF rules can cause false positives, blocking legitimate users. Adjusting rule sensitivity ensures that malicious traffic is blocked without affecting valid requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the primary purpose of a jump server?

a) To provide secure access between security zones
b) To act as a firewall between public and private networks
c) To improve network performance by load balancing requests
d) To replace traditional VPN connections

A

Answer: a) To provide secure access between security zones

Explanation:
A jump server is a controlled access point that allows administrators to securely connect to isolated security zones without exposing them directly to public networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What type of security device monitors network traffic but does not actively block threats?

a) Intrusion Detection System (IDS)
b) Intrusion Prevention System (IPS)
c) Web Application Firewall (WAF)
d) Next-Generation Firewall (NGFW)

A

Answer: a) Intrusion Detection System (IDS)

Explanation:
An IDS is a passive monitoring tool that detects threats and generates alerts without blocking traffic, whereas an IPS actively prevents detected threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What security technology combines firewall capabilities, anti-malware, IDS/IPS, and VPN into a single security device?

a) Unified Threat Management (UTM)
b) Secure Access Service Edge (SASE)
c) Web Application Firewall (WAF)
d) Layer 7 Firewall

A

Answer: a) Unified Threat Management (UTM)

Explanation:
UTM devices consolidate multiple security functions into one system, offering firewall, IDS/IPS, VPN, anti-malware, and content filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the primary function of a Web Application Firewall (WAF)?

a) To protect against SQL injection, cross-site scripting (XSS), and web-based attacks
b) To filter all incoming and outgoing network traffic
c) To encrypt web traffic using SSL/TLS
d) To monitor network activity at the transport layer

A

Answer: a) To protect against SQL injection, cross-site scripting (XSS), and web-based attacks

Explanation:
A WAF is designed to monitor and filter web traffic, protecting web applications from SQL injection, XSS, and other web vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What type of network appliance is responsible for distributing traffic across multiple servers to prevent overloading a single resource?

a) Proxy Server
b) Load Balancer
c) Network Tap
d) Firewall

A

Answer: b) Load Balancer

Explanation:
A load balancer ensures efficient traffic distribution, preventing overloading on a single server, improving performance and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the main advantage of Software-Defined Networking (SDN)?

a) It provides centralized control of network traffic through virtualized routing
b) It replaces the need for firewalls and security devices
c) It eliminates the need for physical networking hardware
d) It enhances wireless connectivity in enterprise networks

A

Answer: a) It provides centralized control of network traffic through virtualized routing

Explanation:
SDN separates network control from physical infrastructure, allowing centralized traffic management using software-defined policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What authentication framework is used by 802.1X to verify device access to a network?

a) Kerberos
b) RADIUS
c) Extensible Authentication Protocol (EAP)
d) Lightweight Directory Access Protocol (LDAP)

A

Answer: c) Extensible Authentication Protocol (EAP)

Explanation:
802.1X uses EAP to enforce network access control, often relying on RADIUS servers for device authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the primary function of a Next-Generation Firewall (NGFW)?

a) To provide deep packet inspection, intrusion prevention, and malware filtering
b) To function as a traditional firewall, filtering based only on IP and port numbers
c) To replace the need for VPN connections
d) To act as a proxy server for internet browsing

A

Answer: a) To provide deep packet inspection, intrusion prevention, and malware filtering

Explanation:
An NGFW extends traditional firewall capabilities by inspecting traffic at multiple layers, providing advanced security filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What security model is used to combine SD-WAN technology with cloud-based security controls?

a) Secure Access Service Edge (SASE)
b) Software-Defined Networking (SDN)
c) Network Access Control (NAC)
d) Intrusion Prevention System (IPS)

A

Answer: a) Secure Access Service Edge (SASE)

Explanation:
SASE integrates SD-WAN with cloud-based security controls, ensuring secure remote access while maintaining network performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which VPN mode encrypts both the header and payload of a network packet?

a) Transport Mode
b) Tunnel Mode
c) Full-Tunnel VPN
d) Split-Tunnel VPN

A

Answer: b) Tunnel Mode

Explanation:
IPSec Tunnel Mode encrypts both the payload and header, ensuring maximum data protection during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Why is it important to balance security controls when designing a network’s architecture?

a) Excessive security controls can reduce performance and usability, while too few controls increase vulnerability
b) A network should only have one security control to ensure simplicity
c) Security controls are only effective when applied to external threats, not internal users
d) Security controls should never be updated once implemented

A

Answer: a) Excessive security controls can reduce performance and usability, while too few controls increase vulnerability

Explanation:
A well-balanced security strategy ensures that security controls protect the network without disrupting business operations. Too many controls can impede functionality, while too few can leave critical vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A corporate network administrator is configuring a site-to-site VPN between two remote office locations. The VPN must ensure that the entire packet, including both the payload and header, is encrypted for maximum security.
Which IPSec mode should be used?

a) Transport mode
b) Tunnel mode
c) Split-tunnel mode
d) Full-tunnel mode

A

Answer: b) Tunnel mode

Explanation:
Tunnel mode encrypts the entire packet (both the payload and header), making it the preferred mode for site-to-site VPNs, ensuring secure communication between networks over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is a key difference between an IPSec VPN and an SSL VPN?

a) IPSec VPNs are designed for remote access via web browsers, while SSL VPNs are used for site-to-site connections.
b) IPSec VPNs operate at the network layer providing site-to-site connectivity, while SSL VPNs operate at the application layer and are typically used for remote access through web browsers.
c) IPSec VPNs are less secure than SSL VPNs due to weaker encryption protocols.
d) IPSec VPNs require client software installation, whereas SSL VPNs do not require any client software at all.

A

Answer: b) IPSec VPNs operate at the network layer providing site-to-site connectivity, while SSL VPNs operate at the application layer and are typically used for remote access through web browsers.

Explanation:
IPSec VPNs are ideal for site-to-site connections because they work at the network layer, offering robust security for continuous, permanent connections. In contrast, SSL VPNs operate at the application layer, making them well-suited for remote access scenarios where users can connect via a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is a key difference between a traditional firewall and a Next-Generation Firewall (NGFW)?

a) Traditional firewalls only filter traffic at Layers 3 and 4, while NGFWs provide deep packet inspection (DPI) at Layer 7
b) Traditional firewalls include anti-malware and IPS capabilities, while NGFWs do not
c) NGFWs are only used for web traffic filtering, while traditional firewalls protect entire networks
d) Traditional firewalls analyze encrypted traffic, while NGFWs cannot inspect encrypted traffic

A

Answer: a) Traditional firewalls only filter traffic at Layers 3 and 4, while NGFWs provide deep packet inspection (DPI) at Layer 7

Explanation:
A traditional firewall primarily filters traffic based on IP addresses and ports (Layers 3 and 4). In contrast, an NGFW performs deep packet inspection (DPI) at Layer 7, allowing it to analyze applications, detect threats, and block malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A social media company wants to ensure that its API endpoints are protected from automated bot attacks and unauthorized data scraping.
Which security solution would be most effective?

a) Web Application Firewall (WAF)
b) Stateful Packet Inspection (SPI) Firewall
c) Network Access Control (NAC)
d) Network Intrusion Prevention System (NIPS)

A

Answer: a) Web Application Firewall (WAF)

Explanation:
A WAF is designed to monitor and protect APIs from unauthorized access, bot attacks, and data scraping, making it the best choice for securing web-based services and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A university needs an efficient authentication method for students moving across campus between multiple access points. The system should allow fast re-authentication without requiring full authentication each time.
Which EAP method should be implemented?

a) EAP-TLS
b) EAP-TTLS
c) EAP-FAST
d) EAP-MSCHAPv2

A

Answer: c) EAP-FAST

Explanation:
EAP-FAST (Extensible Authentication Protocol - Flexible Authentication via Secure Tunneling) is designed for roaming devices that require fast re-authentication by using a symmetric shared secret key, improving efficiency in environments with frequent network transitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A financial institution has multiple restricted network zones that contain sensitive customer data. The IT team needs to allow administrators to access these zones securely without exposing them directly to external threats.
Which security control should they implement to achieve this?

a) A web application firewall (WAF)
b) A load balancer
c) A jump server
d) A VPN concentrator

A

Answer: c) A jump server

Explanation:
A jump server acts as a controlled access point between security zones, allowing authorized administrators to connect securely while maintaining strict monitoring and logging of all access attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A network administrator notices unauthorized devices connecting to unused network ports in a corporate office. To prevent rogue devices from accessing the network, the administrator wants to restrict access to only authorized MAC addresses on each switch port.
Which security measure should they implement?

a) 802.1X authentication
b) Port security
c) VLAN segmentation
d) Network Access Control (NAC)

A

Answer: b) Port security

Explanation:
Port security restricts network access by limiting the number of allowed MAC addresses on a switch port, preventing unauthorized devices from connecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A company is setting up a new data center and wants to ensure critical networking devices are protected from physical and logical threats. The security team recommends placing core network switches and routers in a locked, access-controlled room while also using VLANs to separate internal traffic.
Which of the following security principles is being applied?

a) Role-Based Access Control (RBAC)
b) Device Placement Strategy
c) Least Privilege Model
d) Intrusion Prevention System (IPS)

A

Answer: b) Device Placement Strategy

Explanation:
Device placement involves securing both physical and logical components of a network. Placing network devices in an access-controlled room secures them physically, while VLANs segment network traffic to limit logical access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A security administrator is conducting a network audit and discovers that several unused open ports are accessible from the internet. Additionally, multiple user accounts no longer in use still have active login credentials.
Which of the following best describes the security risk in this scenario?

a) Improperly configured firewall rules
b) An expanded attack surface
c) A brute-force vulnerability
d) Lack of multi-factor authentication (MFA)

A

Answer: b) An expanded attack surface

Explanation:
The attack surface includes all potential vulnerabilities that threat actors can exploit. Open ports and unused active accounts unnecessarily increase the attack surface, creating more opportunities for unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is a common security vulnerability associated with wireless connectivity compared to wired connections?

a) Higher bandwidth limitations
b) Susceptibility to eavesdropping and rogue access points
c) Increased hardware costs
d) Limited range of signal transmission

A

Answer: b) Susceptibility to eavesdropping and rogue access points

Explanation:
Wireless networks are inherently more vulnerable to eavesdropping, rogue access points, and man-in-the-middle attacks because data is transmitted over the air, making it easier for attackers to intercept traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A security administrator is configuring the firewall for an organization’s data center. The administrator must decide whether to set the firewall to fail-open or fail-closed in case of a system failure.
Which failure mode should the administrator choose to prioritize security, and what is a potential drawback?

a) Fail-open to ensure continuous access, but it may expose the network to threats
b) Fail-closed to block unauthorized access, but it may disrupt business operations
c) Fail-open to allow administrators time to troubleshoot, but only for low-priority systems
d) Fail-closed to allow temporary access to internal users, but block all external traffic

A

Answer: b) Fail-closed to block unauthorized access, but it may disrupt business operations

Explanation:
A fail-closed configuration is the more secure option, as it prevents unauthorized access during a failure. However, it may also disrupt legitimate traffic, causing downtime for users until the issue is resolved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the primary difference between a forward proxy and a reverse proxy?

a) A forward proxy protects servers, while a reverse proxy protects clients
b) A reverse proxy sits in front of clients, while a forward proxy sits in front of servers
c) A forward proxy sits between clients and the internet, while a reverse proxy sits between clients and backend servers
d) A reverse proxy is used for hiding user identities, while a forward proxy is used for balancing network traffic

A

Answer: c) A forward proxy sits between clients and the internet, while a reverse proxy sits between clients and backend servers

Explanation:
A forward proxy handles requests from clients to external sites, often providing anonymity. A reverse proxy sits in front of backend servers, providing load balancing, caching, and security.

59
Q

What is the primary function of 802.1X in network security?

a) Encrypting network traffic between endpoints
b) Authenticating devices before granting network access
c) Blocking unauthorized USB device connections
d) Providing end-to-end VPN tunneling for remote users

A

Answer: b) Authenticating devices before granting network access

Explanation:
802.1X ensures only authenticated users or devices can connect to a network by requiring authentication through a RADIUS server before granting access.

60
Q

What is a major difference between EAP-TLS and EAP-TTLS?

a) EAP-TTLS requires client-side certificates, while EAP-TLS does not
b) EAP-TLS requires certificates on both the client and the authentication server, while EAP-TTLS only requires a server-side certificate
c) EAP-TLS is used only for wired networks, while EAP-TTLS is for wireless networks
d) EAP-TLS is inherently less secure than EAP-TTLS

A

Answer: b) EAP-TLS requires certificates on both the client and the authentication server, while EAP-TTLS only requires a server-side certificate

Explanation:
EAP-TLS requires both client-side and server-side certificates for mutual authentication, making it more secure but harder to manage. EAP-TTLS only requires a server-side certificate, making it easier to deploy while still securing the authentication process.

61
Q

An enterprise security team wants to deploy a system that can correlate threat data from multiple security appliances, providing a centralized view of network security threats.
Which of the following solutions should they choose?

a) Intrusion Prevention System (IPS)
b) Unified Threat Management (UTM) device
c) Security Information and Event Management (SIEM) system
d) Endpoint Detection and Response (EDR)

A

Answer: b) Unified Threat Management (UTM) device

Explanation:
A UTM can aggregate security data from multiple UTMs across the network and provide a centralized security dashboard, allowing administrators to monitor threats more effectively.

61
Q

What is the main difference between a Layer 4 and a Layer 7 networking device?

a) Layer 4 devices operate at the network layer, while Layer 7 devices operate at the transport layer
b) Layer 4 devices control packet routing, while Layer 7 devices inspect and filter application-level traffic
c) Layer 4 devices analyze encrypted traffic, while Layer 7 devices only handle plaintext data
d) Layer 4 devices provide intrusion detection, while Layer 7 devices prevent network loops

A

Answer: b) Layer 4 devices control packet routing, while Layer 7 devices inspect and filter application-level traffic

Explanation:
A Layer 4 device (such as a traditional firewall) directs network traffic based on IP addresses and ports, while a Layer 7 device (such as an NGFW or WAF) inspects application-specific traffic, providing deeper security and content filtering.

62
Q

A multinational corporation needs to establish a permanent, always-on connection between its remote branch offices and its central headquarters. The connection must support multiple protocols and ensure that sensitive corporate data is securely transmitted over the public internet.
Which VPN solution is most appropriate for this scenario?

a) SSL VPN
b) IPSec VPN
c) PPTP VPN
d) L2TP VPN

A

Answer: b) IPSec VPN

Explanation:
IPSec VPNs operate at the network layer and are commonly used for site-to-site connections. They provide robust, always-on security and support multiple protocols, making them ideal for connecting remote offices to a central headquarters over untrusted networks.

62
Q

A remote employee connects to the company’s VPN but notices that their internet speed slows down significantly when browsing non-work-related websites. The IT department confirms that all of their traffic, including personal browsing, is being routed through the company’s VPN.
Which tunneling method is likely being used?

a) Split-tunnel VPN
b) Full-tunnel VPN
c) Mesh VPN
d) Point-to-Point Tunneling Protocol (PPTP) VPN

A

Answer: b) Full-tunnel VPN

Explanation:
A full-tunnel VPN routes all network traffic through the VPN, including non-work-related browsing, causing higher bandwidth usage and slower speeds. This method is more secure but less efficient than a split-tunnel VPN.

63
Q

A company’s IT department wants to provide employees with secure remote access to internal applications without requiring specialized VPN client software. Employees should be able to access company resources through a web browser from any device.
Which VPN solution should they implement?

a) IPSec VPN in transport mode
b) SSL/TLS VPN (portal-based)
c) Full-tunnel VPN using IPSec
d) Split-tunnel VPN using IPSec

A

Answer: b) SSL/TLS VPN (portal-based)

Explanation:
A portal-based SSL/TLS VPN allows users to securely access internal applications via a web browser, eliminating the need for VPN client software. This is ideal for remote access from unmanaged devices.

64
Q

What is the primary advantage of using SD-WAN over a traditional WAN solution?

a) SD-WAN provides higher security by encrypting all traffic end-to-end
b) SD-WAN dynamically selects the best available connection for traffic, improving performance and availability
c) SD-WAN eliminates the need for any physical network infrastructure
d) SD-WAN is only used for small businesses with limited network needs

A

Answer: b) SD-WAN dynamically selects the best available connection for traffic, improving performance and availability

Explanation:
SD-WAN enables dynamic path selection, automatically routing traffic through the best available network connection (MPLS, broadband, LTE) based on real-time conditions, reducing latency and network downtime.

64
Q

What is a primary benefit of using logical segmentation such as VLANs in device placement?

a) It eliminates the need for physical security controls
b) It increases network availability by reducing latency
c) It isolates different types of network traffic, reducing attack surfaces
d) It prevents brute-force attacks on login credentials

A

Answer: c) It isolates different types of network traffic, reducing attack surfaces
Explanation:
Logical segmentation using VLANs ensures that different network components are isolated, reducing the attack surface and limiting unauthorized access between network segments.

64
Q

A security architect is designing a company’s network security strategy. Their goal is to implement multiple layers of security controls to minimize the impact of potential breaches while ensuring that security measures do not significantly hinder network performance.
Which security principle should guide their approach?

a) Defense in depth (DiD)
b) Zero trust
c) Least privilege
d) Implicit deny

A

Answer: a) Defense in depth (DiD)

Explanation:
Defense in depth (DiD) is a layered security strategy where multiple security controls are implemented throughout the network to reduce the risk of compromise while ensuring resilience if one control fails.

65
Q

A security analyst is setting up a system to monitor network traffic for suspicious activity without interfering with normal operations. The analyst wants a solution that can observe all data packets but not actively block or modify traffic.
Which of the following would be the best choice?

a) An inline intrusion prevention system (IPS)
b) A network tap or monitor
c) A next-generation firewall (NGFW) in active mode
d) A proxy server filtering all traffic

A

Answer: b) A network tap or monitor

Explanation:
A network tap or monitor is a passive device that collects and observes network traffic without interfering, making it ideal for monitoring security threats without impacting performance.

66
Q

What type of traffic does a Web Application Firewall (WAF) primarily inspect and filter?

a) All network traffic, including internal and external traffic
b) Only encrypted traffic within a VPN tunnel
c) Web-based traffic, including HTTP, HTTPS, and API requests
d) Email and spam messages

A

Answer: c) Web-based traffic, including HTTP, HTTPS, and API requests

Explanation:
A WAF focuses on web-related traffic such as HTTP, HTTPS, and API requests, helping to prevent attacks targeting web applications like SQL injection and XSS.

66
Q

A large enterprise wants to implement a secure authentication method for its Wi-Fi network that requires digital certificates on both the client and authentication server for mutual authentication.
Which EAP method should they use?

a) EAP-FAST
b) EAP-TLS
c) EAP-TTLS
d) EAP-MD5

A

Answer: b) EAP-TLS

Explanation:
EAP-TLS (Extensible Authentication Protocol - Transport Layer Security) provides mutual authentication by using certificates on both the client and server, making it one of the most secure but complex to manage due to certificate requirements.

67
Q

A security engineer is configuring a firewall to block specific application-level threats, such as malicious web requests and unauthorized API calls, while still allowing legitimate network traffic.
Which type of firewall should be used for this purpose?

a) Layer 4 firewall
b) Layer 7 firewall
c) Stateful firewall
d) Packet-filtering firewall

A

Answer: b) Layer 7 firewall

Explanation:
A Layer 7 firewall operates at the application layer, allowing it to inspect and filter web traffic, API calls, and application-specific threats, unlike a Layer 4 firewall, which only filters based on IP addresses and ports.

68
Q

A global enterprise with multiple branch offices wants to optimize network performance by dynamically selecting the best available connection (MPLS, broadband, LTE) based on real-time traffic conditions. The solution should ensure high availability and cost efficiency while maintaining secure connectivity between locations.
Which networking solution should they implement?

a) Software-Defined Wide Area Network (SD-WAN)
b) Traditional MPLS network
c) Point-to-Point VPN
d) Layer 2 Ethernet WAN

A

Answer: a) Software-Defined Wide Area Network (SD-WAN)

Explanation:
SD-WAN intelligently routes traffic over multiple connection types (MPLS, broadband, LTE) based on real-time network conditions, improving performance, availability, and cost efficiency.

68
Q

What is the primary security risk associated with using a split-tunnel VPN?

a) All traffic is encrypted, leading to increased network latency
b) Unsecured traffic bypasses the VPN, making the user vulnerable to attacks
c) It requires more bandwidth, making it unsuitable for remote work
d) It prevents users from accessing internal corporate resources

A

Answer: b) Unsecured traffic bypasses the VPN, making the user vulnerable to attacks

Explanation:
A split-tunnel VPN only encrypts traffic directed to corporate resources, while other internet traffic travels unencrypted, exposing users to potential threats like man-in-the-middle (MITM) attacks and malware.

69
Q

A hospital network needs to ensure that patient records remain secure while still allowing guests and visitors to access the internet via public Wi-Fi. The IT team decides to create a separate guest network that has no access to internal systems.
Which of the following best describes this security strategy?

a) Implementing a security zone
b) Using role-based access control (RBAC)
c) Enforcing multi-factor authentication (MFA)
d) Deploying endpoint detection and response (EDR)

A

Answer: a) Implementing a security zone
Explanation:
A security zone is a separate network segment used to isolate sensitive traffic. By creating a guest network, the hospital ensures that public users cannot access patient records or internal systems.

70
Q

What is an example of a physical security zone used to protect highly sensitive network systems?

a) Air-gapped network
b) Virtual LAN (VLAN)
c) Web Application Firewall (WAF)
d) Secure Sockets Layer (SSL)

A

Answer: a) Air-gapped network
Explanation:
An air-gapped network is a physical security zone that completely isolates a system from external connections, preventing unauthorized remote access or cyberattacks.

71
Q

Which of the following actions would be most effective in reducing the attack surface of a corporate network?

a) Regularly patching software and closing unused ports
b) Increasing firewall logging to monitor network traffic
c) Requiring longer passwords for user authentication
d) Implementing load balancing to distribute network traffic

A

Answer: a) Regularly patching software and closing unused ports

Explanation:
Reducing the attack surface involves eliminating unnecessary vulnerabilities, such as closing unused ports, removing outdated accounts, and patching software to fix known exploits.

72
Q

Why should the audit logs from a jump server be stored in a separate location?

a) To reduce storage costs on the jump server
b) To prevent log tampering if the jump server is compromised
c) To make logs easier to access for regular maintenance
d) To allow administrators to manually edit logs if needed

A

Answer: b) To prevent log tampering if the jump server is compromised

Explanation:
If an attacker gains access to a jump server, they could attempt to delete or modify logs to cover their tracks. Storing logs in a separate, secure location ensures the integrity of the audit trail.

73
Q

Which of the following is a critical aspect of securing network infrastructure?

a) Ensuring all network devices have high-speed connectivity
b) Using redundant power supplies for networking equipment
c) Implementing access controls and network segmentation
d) Upgrading all network hardware to the latest model

A

Answer: c) Implementing access controls and network segmentation

Explanation:
A secure infrastructure must include access controls to restrict unauthorized access and network segmentation to isolate sensitive systems, reducing the risk of lateral movement by attackers.

74
Q

What happens when a switch port configured with port security detects an unauthorized MAC address?

a) The port shuts down or restricts access based on security settings
b) The device is placed on a separate VLAN for monitoring
c) The switch dynamically assigns a new MAC address to the device
d) The port automatically blocks all network traffic for all devices

A

a) The port shuts down or restricts access based on security settings

Explanation:
When a port security violation occurs, the switch can disable the port (shutdown mode), restrict traffic (restrict mode), or drop unauthorized traffic (protect mode) depending on configuration.

74
Q

A remote office needs to establish secure and reliable connectivity to the corporate headquarters. The IT team must choose between wired and wireless options, ensuring data integrity and minimal latency for mission-critical applications.
Which of the following would provide the most secure and stable connection for the remote office?

a) Wi-Fi 6 with WPA3 encryption
b) Fiber-optic leased line
c) Satellite internet with VPN tunneling
d) 5G cellular network with multi-factor authentication

A

Answer: b) Fiber-optic leased line

Explanation:
A fiber-optic leased line offers dedicated, high-speed, and secure connectivity with low latency and resistance to electromagnetic interference, making it ideal for stable and mission-critical communications.

74
Q

In which scenario would using a fail-open security configuration be most appropriate?

a) A firewall protecting a sensitive government database
b) A network authentication server used for access control
c) A life-support system in a hospital’s intensive care unit
d) A biometric access system controlling entry to a server room

A

Answer: c) A life-support system in a hospital’s intensive care unit

Explanation:
A fail-open configuration is used when availability is more critical than security, such as in life-support systems, where blocking access during failure could endanger lives.

75
Q

A financial institution is building a new data center to house its core banking infrastructure. The security team is tasked with implementing both physical and logical controls to protect against external threats.
Which of the following infrastructure security measures should they implement first to provide the most comprehensive protection?

a) Deploying biometric authentication at entry points
b) Configuring firewalls and IDS/IPS to monitor network traffic
c) Enforcing network segmentation and access controls
d) Implementing all of the above together

A

Answer: d) Implementing all of the above together

Explanation:
Infrastructure security requires multiple layers of protection, including physical controls (biometrics), network security (firewalls, IDS/IPS), and logical segmentation (access controls, VLANs) to minimize vulnerabilities and reduce the attack surface.

75
Q

A company wants to improve security and performance for its public-facing web applications. They need a solution that can hide the identity of backend servers, distribute traffic evenly, and cache content to reduce load times.
Which network appliance should they implement?

a) Forward proxy
b) Reverse proxy
c) Jump server
d) Next-generation firewall (NGFW)

A

Answer: b) Reverse proxy

Explanation:
A reverse proxy sits between the client and the server, helping to distribute traffic, cache content, and hide backend server identities, improving security and performance.

76
Q

Why is EAP-FAST considered a good choice for roaming devices?

a) It uses public key encryption to authenticate clients quickly
b) It supports fast re-authentication by using a shared secret key
c) It does not require authentication for each new connection
d) It uses biometric authentication instead of passwords

A

Answer: b) It supports fast re-authentication by using a shared secret key

Explanation:
EAP-FAST was developed by Cisco for secure but fast authentication, using a symmetric shared secret key to allow quick re-authentication without full credential verification each time.

77
Q

What is the main advantage of using a Unified Threat Management (UTM) device over separate security solutions?

a) It provides higher security than standalone firewalls
b) It integrates multiple security features into a single platform for easier management
c) It eliminates the need for encryption in VPN connections
d) It only focuses on preventing denial-of-service (DoS) attacks

A

Answer: b) It integrates multiple security features into a single platform for easier management

Explanation:
A UTM simplifies security management by combining firewall, IDS/IPS, VPN, anti-malware, and content filtering into a single, centrally managed device, reducing complexity and cost.

78
Q

A remote employee needs to securely access their company’s internal network while working from home. The IT department wants to ensure that all traffic between the employee’s device and the corporate network is encrypted and protected from eavesdropping.
Which solution should they implement?

a) Virtual Private Network (VPN)
b) Jump server
c) Web proxy
d) Network Access Control (NAC)

A

Answer: a) Virtual Private Network (VPN)

Explanation:
A VPN provides secure, encrypted communication over the internet, allowing remote users to safely access the corporate network as if they were on-site, protecting against eavesdropping and data interception.

78
Q

What is the primary benefit of a Secure Access Service Edge (SASE) architecture?

a) It focuses only on securing on-premises network traffic
b) It combines networking and security services into a cloud-based model, providing secure access from any location
c) It replaces firewalls and VPNs with a single on-site appliance
d) It only applies to organizations using a private cloud infrastructure

A

Answer: b) It combines networking and security services into a cloud-based model, providing secure access from any location

Explanation:
SASE is a cloud-centric framework that integrates networking (SD-WAN, VPNs) with security services (CASB, firewalls, threat detection) to provide secure and optimized access to corporate resources from anywhere in the world.

78
Q

A company wants to enable employees working from home to securely connect to the corporate network only when needed. The solution should provide encrypted access without requiring a permanent connection.
Which type of VPN should the company implement?

a) Site-to-site VPN
b) Remote access VPN
c) Mesh VPN
d) Point-to-Point Tunneling Protocol (PPTP) VPN

A

Answer: b) Remote access VPN

Explanation:
A remote access VPN allows users to connect securely on demand, providing encrypted access only when needed, unlike a site-to-site VPN, which is always on between locations.

79
Q

What is the main difference between an inline security device and a network tap/monitor?

a) An inline device actively processes and controls traffic, while a network tap/monitor only observes traffic
b) A network tap is part of the active data stream, while an inline device only passively collects traffic
c) An inline device is used for monitoring, while a network tap actively blocks threats
d) A network tap requires continuous power, while an inline device only collects data when needed

A

Answer: a) An inline device actively processes and controls traffic, while a network tap/monitor only observes traffic

Explanation:
An inline device (e.g., an IPS) actively analyzes and filters traffic, while a network tap or monitor passively collects data without affecting live network traffic.

79
Q

A company wants to enhance network security by requiring devices to authenticate before gaining access to the corporate wired and wireless network. The security team decides to use a protocol that enforces authentication at the network switch or access point before allowing traffic.
Which security standard should they implement?

a) WPA3
b) 802.1X
c) MAC filtering
d) Port mirroring

A

Answer: b) 802.1X

Explanation:
802.1X is a network access control standard that requires device authentication before allowing network access, commonly used with RADIUS authentication for both wired and wireless networks.

80
Q

A company wants to deploy secure wireless authentication but does not want to install client-side certificates on every user device due to management complexity.
Which EAP method would be the best choice?

a) EAP-TLS
b) EAP-FAST
c) EAP-TTLS
d) PEAP

A

Answer: c) EAP-TTLS

Explanation:
EAP-TTLS (Extensible Authentication Protocol - Tunneled Transport Layer Security) improves on EAP-TLS by eliminating the need for a client certificate, reducing administrative overhead, while still offering strong authentication.

81
Q

A company operates an e-commerce website that processes thousands of online transactions daily. The security team has observed an increase in SQL injection and cross-site scripting (XSS) attacks targeting their web applications.
Which security solution should they implement to mitigate these attacks?

a) Next-Generation Firewall (NGFW)
b) Web Application Firewall (WAF)
c) Intrusion Detection System (IDS)
d) Load Balancer

A

Answer: b) Web Application Firewall (WAF)

Explanation:
A WAF is specifically designed to monitor, filter, and block malicious web-based traffic, including SQL injection, XSS, and API-based attacks, making it the best solution for protecting web applications.

82
Q

A large enterprise wants to implement a firewall solution that not only filters traffic based on IP addresses and ports but also inspects packets at the application layer, detects intrusions, and blocks malware in real time.
Which security solution best meets these requirements?

a) Unified Threat Management (UTM) device
b) Traditional stateful firewall
c) Next-Generation Firewall (NGFW)
d) Web Application Firewall (WAF)

A

Answer: c) Next-Generation Firewall (NGFW)

Explanation:
An NGFW provides deep packet inspection (DPI), intrusion prevention (IPS), intrusion detection (IDS), and anti-malware protection, making it a more advanced security solution compared to traditional firewalls.

82
Q

What is the main purpose of a Virtual Private Network (VPN)?

a) To increase internet speed by optimizing traffic routing
b) To provide secure, encrypted communication over an untrusted network
c) To block unauthorized users from accessing public websites
d) To create a physical connection between two remote networks

A

Answer: b) To provide secure, encrypted communication over an untrusted network

Explanation:
A VPN establishes an encrypted tunnel between two endpoints, securing data transmissions over the internet and preventing unauthorized access to sensitive communications.

83
Q

What is a key characteristic of a site-to-site VPN compared to a remote access VPN?

a) A site-to-site VPN requires a VPN client installed on each user’s device, while a remote access VPN does not
b) A site-to-site VPN is always on, connecting entire networks, while a remote access VPN is used on an as-needed basis for individual users
c) A site-to-site VPN is less secure than a remote access VPN
d) A remote access VPN is primarily used for cloud environments, while a site-to-site VPN is only for on-premises networks

A

Answer: b) A site-to-site VPN is always on, connecting entire networks, while a remote access VPN is used on an as-needed basis for individual users

Explanation:
A site-to-site VPN creates a permanent, encrypted connection between two networks, such as branch offices and headquarters. A remote access VPN allows individual users to securely connect to the corporate network only when needed.

83
Q

How does IPSec transport mode differ from IPSec tunnel mode?

a) Transport mode encrypts only the payload, while tunnel mode encrypts the entire packet
b) Tunnel mode is only used for remote access VPNs, while transport mode is used for site-to-site VPNs
c) Transport mode is more secure than tunnel mode because it encrypts both the payload and header
d) Tunnel mode requires an SSL certificate, while transport mode does not

A

Answer: a) Transport mode encrypts only the payload, while tunnel mode encrypts the entire packet

Explanation:
Transport mode encrypts only the data payload, leaving the IP header visible, while tunnel mode encrypts both the payload and the header, providing greater security for site-to-site VPNs.

84
Q

A global enterprise has employees working from various locations (home, branch offices, and coffee shops). The company wants to ensure secure, low-latency access to cloud-based applications while enforcing consistent security policies across all users, regardless of location.
Which solution would best meet their needs?

a) Traditional MPLS with site-to-site VPNs
b) Software-Defined Wide Area Network (SD-WAN) only
c) Secure Access Service Edge (SASE)
d) Next-Generation Firewall (NGFW) deployed at each location

A

Answer: c) Secure Access Service Edge (SASE)

Explanation:
SASE integrates SD-WAN, VPN, CASB, firewalls, and other security measures to provide secure, scalable access for users regardless of their location, ensuring consistent security policies while improving performance for cloud applications.

84
Q

How does an SSL/TLS VPN differ from an IPSec VPN in terms of network layer functionality?

a) SSL/TLS VPNs operate at Layer 6 (presentation layer), while IPSec VPNs operate at Layer 3 (network layer)
b) SSL/TLS VPNs encrypt all network traffic, while IPSec VPNs only encrypt application data
c) IPSec VPNs are more secure than SSL/TLS VPNs
d) SSL/TLS VPNs require a dedicated VPN client, while IPSec VPNs can be accessed via a web browser

A

Answer: a) SSL/TLS VPNs operate at Layer 6 (presentation layer), while IPSec VPNs operate at Layer 3 (network layer)

Explanation:
An SSL/TLS VPN functions at the presentation layer (Layer 6), making it suitable for web-based access with granular control over applications. An IPSec VPN functions at the network layer (Layer 3) and is commonly used for site-to-site or full-network encryption.

85
Q

A company is implementing data classification policies to help employees understand how to handle different types of information. The IT team needs to categorize data based on sensitivity and usage, ensuring that sensitive data is handled with stricter security controls than public data.
Which approach should they use to achieve this?

a) Data masking
b) Data classification
c) Data encryption
d) Data loss prevention (DLP)

A

Answer: b) Data classification

Explanation:
Data classification helps organizations categorize data based on its sensitivity and intended use, ensuring that appropriate security controls are applied to protect confidential and sensitive information.

85
Q

What is a key characteristic of regulated data?

a) It is only relevant to financial organizations
b) It is subject to external laws and regulations that dictate security and storage requirements
c) It does not require encryption since it is already public information
d) It only applies to U.S.-based organizations

A

Answer: b) It is subject to external laws and regulations that dictate security and storage requirements

Explanation:
Regulated data is governed by laws such as HIPAA (healthcare data), GDPR (EU personal data), and SOX (financial data) to ensure proper handling, security, and compliance to protect sensitive information.

86
Q

A graphic designer creates a new company logo for a client, and the company wants to ensure legal protection to prevent others from using it without permission.
Which type of intellectual property protection should they apply for?

a) Copyright
b) Patent
c) Trademark
d) Trade secret

A

Answer: c) Trademark

Explanation:
A trademark protects logos, brand names, and symbols that distinguish a business from competitors. This ensures that only the rightful owner can legally use the design in commerce.

86
Q

A tech company has developed a proprietary encryption algorithm that gives it a competitive advantage in the cybersecurity industry. The company wants to ensure this algorithm remains confidential and is not leaked to competitors.
Which classification best describes this type of data?

a) Regulated data
b) Public data
c) Trade secret
d) Personally identifiable information (PII)

A

Answer: c) Trade secret

Explanation:
Trade secret data consists of proprietary business information, such as manufacturing processes, formulas, or algorithms, that gives a company a competitive edge. Protecting trade secrets is critical to maintaining business advantage.

87
Q

What is the primary purpose of PCI DSS in relation to financial information?

a) To regulate stock market transactions
b) To secure the processing, storage, and transmission of credit card data
c) To prevent financial institutions from sharing customer data
d) To establish government control over banking operations

A

Answer: b) To secure the processing, storage, and transmission of credit card data

Explanation:
PCI DSS establishes security standards to protect credit card information from fraud and unauthorized access. It ensures that businesses handling payment card transactions follow secure practices for storing, processing, and transmitting financial data.

87
Q

A medical facility collects patient records containing personal health information (PHI). This data must be protected and only shared under strict conditions in compliance with privacy regulations.
Which data classification should be applied to this information?

a) Public
b) Confidential
c) Restricted
d) Private

A

Answer: b) Confidential

Explanation:
Confidential data includes medical records, business contracts, and sensitive internal communications that should only be accessed by authorized entities and protected under strict security policies.

87
Q

Which of the following best describes “data at rest”?
A) Data being transmitted over a network
B) Data currently being stored in RAM for processing
C) Data stored in a permanent location awaiting retrieval
D) Data actively being edited in a database

A

Answer: C) Data stored in a permanent location awaiting retrieval

Explanation: Data at rest refers to data that is stored and not actively being transmitted or processed. It can reside on hard drives, USB devices, cloud storage, or other storage solutions.

88
Q

Which security method restricts access to data based on geographic location?
A) Encryption
B) Hashing
C) Geofencing
D) Obfuscation

A

Answer: C) Geofencing
Explanation: Geofencing uses GPS, IP addresses, or other location-based technologies to restrict access to data or systems based on geographic location.

89
Q

A company requires a backup site that can take over immediately in case of a failure at the primary location. Which type of site should they use?
A) Hot site
B) Cold site
C) Warm site
D) Cloud-based site

A

Answer: A) Hot site
Explanation: A hot site is always running and can take over instantly when the primary site fails, ensuring high availability.

89
Q

How does load balancing contribute to high availability?
A) It distributes traffic across multiple independent systems
B) It allows multiple devices to function as a single unit
C) It encrypts network traffic to prevent unauthorized access
D) It physically isolates critical systems for security

A

Answer: A) It distributes traffic across multiple independent systems
Explanation: Load balancing helps distribute workload across multiple servers to prevent any single system from becoming overwhelmed, improving uptime and availability.

90
Q

Which data classification is used to protect business data that has the highest potential negative impact if breached?

a) Sensitive
b) Restricted
c) Confidential
d) Private

A

Answer: b) Restricted

Explanation:
Restricted data pertains to highly sensitive business information, such as intellectual property, proprietary research, and financial records, which requires strict access controls due to its high impact if compromised.

91
Q

Why is data classification important in cybersecurity?

a) It allows organizations to prioritize security controls based on data sensitivity and usage
b) It eliminates the need for encryption by organizing data effectively
c) It ensures all data is publicly accessible for better transparency
d) It only applies to financial data and is not useful for other types of information

A

Answer: a) It allows organizations to prioritize security controls based on data sensitivity and usage

Explanation:
Data classification helps organizations identify, categorize, and prioritize data based on its sensitivity and importance, ensuring that appropriate security measures are in place to protect sensitive information while allowing efficient access to less critical data.

91
Q

A healthcare provider stores patient records, including names, medical histories, and social security numbers. They must comply with strict regulatory requirements to protect this information.
Which regulation is most relevant to ensuring the security and privacy of this data?

a) Sarbanes-Oxley Act (SOX)
b) Health Insurance Portability and Accountability Act (HIPAA)
c) General Data Protection Regulation (GDPR)
d) Federal Information Security Modernization Act (FISMA)

A

Answer: b) Health Insurance Portability and Accountability Act (HIPAA)

Explanation:
HIPAA regulates the protection, storage, and transmission of healthcare data in the U.S., ensuring that personally identifiable health information (PHI) remains secure and confidential.

91
Q

A financial company encrypts customer records before storing them in a cloud database. Which data state does this security measure protect?
A) Data in use
B) Data at rest
C) Data in transit
D) Data integrity

A

Answer: B) Data at rest
Explanation: Encrypting stored data helps protect data at rest from unauthorized access or theft.

91
Q

What is the primary reason organizations store backup data in an offsite location?
A) To comply with GDPR and other privacy regulations
B) To reduce latency in accessing stored data
C) To prevent data loss due to localized disasters
D) To decrease the costs of on-premises storage solutions

A

Answer: C) To prevent data loss due to localized disasters
Explanation: Keeping backups in a separate geographic location protects against data loss from disasters such as fires, floods, and cyberattacks.

91
Q

What is the primary reason businesses protect trade secret data?

a) It contains personally identifiable information (PII) that must be protected under compliance laws
b) It is subject to government regulations that require public disclosure
c) It provides a competitive advantage and must remain confidential to maintain business success
d) It is encrypted by default and cannot be accessed by unauthorized individuals

A

Answer: c) It provides a competitive advantage and must remain confidential to maintain business success

Explanation:
Businesses protect trade secrets because they contain valuable proprietary information, such as formulas, processes, or algorithms, that provide a competitive advantage in the marketplace. If exposed, competitors could replicate the technology or process, leading to financial losses.

92
Q

A company’s payroll system contains employee salary details, bank account numbers, and social security numbers. This data should only be accessible to authorized personnel, as exposure could lead to identity theft and fraud.
How should this data be classified?

a) Private
b) Public
c) Critical
d) Restricted

A

Answer: a) Private

Explanation:
Private data includes financial details, personal identifiers, and payroll information, which should only be accessible by the user or authorized individuals to prevent identity theft or financial fraud.

93
Q

A retail company processes credit card transactions for online purchases. To comply with industry security standards, they must ensure that customer payment information is securely stored, processed, and transmitted.
Which standard must they follow?

a) General Data Protection Regulation (GDPR)
b) Sarbanes-Oxley Act (SOX)
c) Payment Card Industry Data Security Standard (PCI DSS)
d) Health Insurance Portability and Accountability Act (HIPAA)

A

Answer: c) Payment Card Industry Data Security Standard (PCI DSS)

Explanation:
PCI DSS is a contractual security standard that applies to businesses handling credit card transactions, ensuring the secure storage, processing, and transmission of financial data.

94
Q

Which of the following security techniques is most effective at preventing unauthorized data access in all data states?
A) Hashing
B) Encryption
C) Masking
D) Tokenization

A

Answer: B) Encryption
Explanation: Encryption can be applied to data in all states (at rest, in transit, and in use), making it an essential security measure for protecting sensitive data.

94
Q

Which of the following data classifications is generally considered to have the lowest security risk?

a) Sensitive
b) Confidential
c) Public
d) Restricted

A

Answer: c) Public

Explanation:
Public data is intended for general access and does not require protection measures. Examples include press releases, promotional materials, and government-published statistics.

94
Q

A system administrator wants to limit user access to certain data based on their job role. Which method should be used?
A) Tokenization
B) Permission restrictions
C) Hashing
D) Geofencing

A

Answer: B) Permission restrictions
Explanation: Permission restrictions control access based on user roles, ensuring only authorized individuals can access specific data.

95
Q

What is the primary goal of high availability?
A) Preventing unauthorized access to data
B) Ensuring minimal downtime and continuous system operation
C) Improving network speed and latency
D) Encrypting data for confidentiality

A

Answer: B) Ensuring minimal downtime and continuous system operation
Explanation: High availability ensures that critical systems remain operational with minimal interruption by using redundancy and fault tolerance.

96
Q

Which type of intellectual property (IP) protection is used to safeguard inventions and unique processes?

a) Copyright
b) Patent
c) Trademark
d) Trade secret

A

Answer: b) Patent

Explanation:
A patent protects new inventions, unique processes, and technological advancements, preventing others from using, selling, or manufacturing the invention without authorization.

97
Q

Which security measure ensures that stored passwords cannot be reversed to their original form?
A) Masking
B) Encryption
C) Hashing
D) Tokenization

A

Answer: C) Hashing
Explanation: Hashing converts data into a fixed-length value that cannot be reversed. This makes it ideal for storing passwords securely.

97
Q

What is the primary difference between public data and restricted data?

a) Public data is freely accessible, while restricted data requires strict access controls
b) Restricted data is only available to government entities, while public data can be accessed by businesses
c) Public data must be encrypted before sharing, whereas restricted data does not require encryption
d) Restricted data can be shared with anyone, but public data has specific access limitations

A

Answer: a) Public data is freely accessible, while restricted data requires strict access controls

Explanation:
Public data is openly available to the public and does not require security controls, while restricted data is highly sensitive and requires strict access controls to prevent unauthorized disclosure.

98
Q

A company segments its network to store customer payment data separately from general business records. What is the primary benefit of this approach?
A) Preventing unauthorized access to all data
B) Improving network speed
C) Reducing the impact of a data breach
D) Enhancing encryption strength

A

Answer: C) Reducing the impact of a data breach
Explanation: Data segmentation isolates sensitive information from other network areas, limiting exposure in the event of a security breach.

99
Q

What is the key distinction between load balancing and clustering?
A) Load balancing requires identical hardware, while clustering does not
B) Load balancing distributes traffic among separate systems, whereas clustering makes multiple systems function as one
C) Load balancing applies only to cloud environments, while clustering applies to on-premises data centers
D) Clustering improves security, while load balancing improves availability

A

Answer: B) Load balancing distributes traffic among separate systems, whereas clustering makes multiple systems function as one
Explanation: Load balancing ensures even distribution of network requests across independent devices, while clustering groups multiple devices to work as a single unit, improving redundancy and fault tolerance.

99
Q

A healthcare organization wants to remove personally identifiable information (PII) from patient data while still allowing statistical analysis. Which technique should be used?
A) Encryption
B) Obfuscation
C) Hashing
D) Masking

A

Answer: B) Obfuscation
Explanation: Obfuscation (or data anonymization) removes or modifies identifiers in data to prevent tracking back to individuals while still allowing analysis.

99
Q

What is the key characteristic of a cold site?
A) It is fully equipped and ready to take over operations immediately
B) It has all necessary hardware but requires data restoration
C) It is an empty facility with power and network connectivity but no hardware
D) It is a cloud-based solution that can be deployed rapidly

A

Answer: C) It is an empty facility with power and network connectivity but no hardware
Explanation: A cold site is the least expensive option, requiring organizations to bring in hardware and set up operations when needed.

99
Q

Which testing method is the least intrusive and involves verbal discussions of scenarios and planned responses?
A) Failover testing
B) Parallel processing
C) Tabletop exercises
D) Simulation testing

A

Answer: C) Tabletop exercises
Explanation: Tabletop exercises are discussions of potential scenarios and response plans, allowing organizations to identify vulnerabilities without impacting operations.

100
Q

What is the primary security concern for data in transit?

A) Ensuring redundancy in case of data loss
B) Preventing unauthorized access and interception
C) Protecting against physical theft of storage devices
D) Monitoring for data corruption

A

Answer: B) Preventing unauthorized access and interception

Explanation: Data in transit is vulnerable to eavesdropping, interception, and man-in-the-middle (MitM) attacks. Encryption protocols like TLS (Transport Layer Security) help secure data in motion.

101
Q

A government agency stores nuclear launch codes in a heavily secured environment. If this data were leaked, it could cause massive destruction and national security threats.
Which data classification best applies to this information?

a) Sensitive
b) Confidential
c) Critical
d) Public

A

Answer: c) Critical

Explanation:
Critical data includes high-impact information, such as military operations, classified government documents, and nuclear launch codes, requiring extensive security measures due to the catastrophic consequences if compromised.

102
Q

Which security measure is most effective in protecting data at rest?

A) Transport Layer Security (TLS)
B) BitLocker or full-disk encryption
C) Intrusion Detection System (IDS)
D) Multi-factor authentication (MFA)

A

Answer: B) BitLocker or full-disk encryption

Explanation: Data at rest is best protected using encryption methods like BitLocker, which secures stored data and prevents unauthorized access if the device is lost or stolen.

103
Q

An organization wants to store a backup copy of its critical data offsite. What is the recommended minimum distance for this backup location?
A) 25 miles
B) 50 miles
C) 90 miles
D) 150 miles

A

Answer: C) 90 miles
Explanation: To protect against geographically related disasters such as earthquakes or hurricanes, organizations should store backups at least 90 miles away from the primary data center.

104
Q

Which of the following best describes geolocation considerations in data storage?
A) Only storing backups in the cloud to ensure accessibility
B) Keeping all data in a single data center for security purposes
C) Storing data in multiple geographic locations to reduce risks from disasters
D) Encrypting data before transmission over the internet

A

Answer: C) Storing data in multiple geographic locations to reduce risks from disasters
Explanation: Storing data in multiple locations ensures redundancy and minimizes the risk of data loss due to natural disasters, power outages, or localized cyber incidents.

104
Q

What is the primary goal of capacity planning in a network environment?
A) To ensure encryption is applied to all network traffic
B) To allow a network to scale in response to current and future demands
C) To reduce the number of network devices in an infrastructure
D) To centralize all network resources in a single data center

A

Answer: B) To allow a network to scale in response to current and future demands
Explanation: Capacity planning ensures that a network can handle increased usage by expanding resources as needed.

104
Q

An organization’s data is housed in a cloud provider’s data center, which spans multiple countries. Which legal principle must they comply with?
A) Data in motion encryption standards
B) Data sovereignty
C) The principle of least privilege
D) Security through obscurity

A

Answer: B) Data sovereignty
Explanation: Data sovereignty requires that data be handled according to the laws and regulations of the country where it was originally collected, even if it is stored in other countries.

104
Q

When entering a credit card number online, only the last four digits are displayed while the rest are replaced with asterisks. What security technique is being used?
A) Tokenization
B) Hashing
C) Masking
D) Obfuscation

A

Answer: C) Masking
Explanation: Data masking replaces portions of sensitive data with generic characters to prevent unauthorized access while still allowing limited visibility.

104
Q

How does a warm site differ from a hot site?
A) A warm site is always online and can take over immediately
B) A warm site has the required hardware but needs data restoration before becoming operational
C) A warm site contains only power and network connectivity
D) A warm site is a cloud-based infrastructure

A

Answer: B) A warm site has the required hardware but needs data restoration before becoming operational
Explanation: A warm site is partially prepared, with all hardware and connections in place, but data must be restored before use.

104
Q

Which of the following is the primary concern when implementing tokenization?
A) The security of the lookup table
B) The inability to retrieve original data
C) The high computational power required
D) The requirement of internet connectivity

A

Answer: A) The security of the lookup table
Explanation: Since tokenization relies on a lookup table to map tokens back to their original values, securing the table is critical to preventing unauthorized access.

104
Q

Which of the following best describes the role of people in capacity planning?
A) Implementing encryption protocols for secure communications
B) Increasing staff levels to meet growing network demands
C) Designing new hardware for expanded network coverage
D) Managing cloud-based storage solutions for scalability

A

Answer: B) Increasing staff levels to meet growing network demands
Explanation: The people component of capacity planning ensures enough personnel are available to manage growing infrastructure needs, either internally or through third-party staffing.

105
Q

Which testing method involves switching entirely to a recovery site or backup system to evaluate its resilience?
A) Tabletop exercise
B) Parallel processing
C) Failover testing
D) Simulation testing

A

Answer: C) Failover testing
Explanation: Failover testing is the most intrusive method, as it fully switches operations to a backup site to test its effectiveness.

106
Q

What is the primary benefit of offsite backups compared to onsite backups?
A) They provide faster recovery times
B) They are more resistant to localized disasters
C) They require less storage space
D) They eliminate the need for encryption

A

Answer: B) They are more resistant to localized disasters
Explanation: Offsite backups ensure that data remains available even if the primary site is affected by a disaster, such as fire or flooding.

107
Q

A security analyst is reviewing access logs and notices an employee accessing an internal database for payroll processing. Which data state best describes this situation?

A) Data at rest
B) Data in motion
C) Data in use
D) Data exfiltration

A

Answer: C) Data in use
Explanation: Data in use refers to data that is actively being processed or accessed by an application, often residing in RAM or temporary storage for quick retrieval.

108
Q

What is the primary difference between hashing and encryption?
A) Hashing can be reversed, but encryption cannot
B) Encryption requires a key for decryption, but hashing cannot be reversed
C) Hashing is used for securing communications, while encryption is used for data storage
D) Encryption only applies to data in transit, while hashing applies to data at rest

A

Answer: B) Encryption requires a key for decryption, but hashing cannot be reversed
Explanation: Encryption can be reversed with the correct key, while hashing creates a fixed-length output that cannot be reversed.

109
Q

A company wants to test its disaster recovery plan by simulating a real-world cyberattack and having employees respond as if it were happening. Which testing method should they use?
A) Tabletop exercise
B) Simulation testing
C) Parallel processing
D) Failover testing

A

Answer: B) Simulation testing
Explanation: Simulation testing creates a real-time environment where teams actively respond to a simulated crisis, allowing for hands-on testing of recovery plans.

109
Q

What is the primary benefit of geographic dispersion for backup sites?
A) It ensures all systems remain in a single controlled environment
B) It prevents a single incident, like a natural disaster, from affecting all resources
C) It allows for faster data encryption
D) It improves firewall security

A

Answer: B) It prevents a single incident, like a natural disaster, from affecting all resources
Explanation: Geographic dispersion ensures critical infrastructure remains operational by keeping backup sites in different locations, reducing the risk of widespread failure.

109
Q

A company is experiencing increased network traffic and decides to deploy additional load balancers to handle the demand. Which aspect of capacity planning does this represent?
A) People
B) Technology
C) Infrastructure
D) Security

A

Answer: B) Technology
Explanation: The technology component of capacity planning involves deploying tools, such as load balancers, to support increased demand.

110
Q

A company wants to ensure that its backup data is protected from unauthorized access. What security measure should be applied?
A) Storing the backup in an encrypted ZIP file
B) Implementing journaling to track changes
C) Encrypting the backup
D) Storing backups in an isolated network without internet access

A

Answer: C) Encrypting the backup
Explanation: Encryption is essential for protecting backup data from unauthorized access, as backups often contain sensitive network information.

111
Q

Which of the following is a key consideration of data sovereignty?

A) The encryption method used for securing stored data
B) The physical location of the servers that store the data
C) The speed of data retrieval from cloud storage
D) The amount of redundancy built into a storage system

A

Answer: B) The physical location of the servers that store the data

Explanation: Data sovereignty requires that data stored or processed must comply with the laws of the country where it originated, regardless of where it is physically stored.

112
Q

What is the primary function of a generator in a power failure scenario?
A) To provide short-term power for critical systems
B) To protect against power fluctuations
C) To supply long-term backup power during an outage
D) To charge UPS batteries automatically

A

Answer: C) To supply long-term backup power during an outage
Explanation: Generators provide an alternative power source during extended outages, ensuring that critical systems remain operational.

113
Q

What is the recommended minimum distance for geographically dispersed backup sites?
A) 25 miles
B) 50 miles
C) 90 miles
D) 150 miles

A

Answer: C) 90 miles
Explanation: A common best practice is to place backup data centers at least 90 miles apart to reduce risks from regional disasters or power grid failures.

114
Q

How does platform diversity improve network resilience?
A) By using a single vendor to simplify security management
B) By implementing multiple systems, vendors, or technologies to prevent a single point of failure
C) By requiring all systems to run identical software for compatibility
D) By centralizing all resources into a single data center

A

Answer: B) By implementing multiple systems, vendors, or technologies to prevent a single point of failure
Explanation: Platform diversity reduces network risk by ensuring that if one system fails or is vulnerable, others remain operational.

115
Q

What is the main advantage of using a multi-cloud system?
A) It eliminates the need for encryption
B) It ensures data is only stored in a single cloud provider
C) It provides redundancy and allows for quick switching between cloud services in case of failure
D) It limits access to cloud services based on geographic location

A

Answer: C) It provides redundancy and allows for quick switching between cloud services in case of failure
Explanation: Multi-cloud systems improve resilience by using multiple cloud providers, allowing a company to shift operations in case of an outage or service failure.

115
Q

Which testing method involves processing data at both the primary and backup sites to evaluate the alternative site’s capabilities?
A) Failover testing
B) Parallel processing
C) Tabletop exercise
D) Simulation testing

A

Answer: B) Parallel processing
Explanation: Parallel processing allows an organization to test its backup site while still running operations at the primary site, reducing the risk of disruption.

115
Q

Which of the following factors most influences continuity of operations in a network?
A) The number of users on the network
B) Cost, risk appetite, and complexity of the infrastructure
C) The presence of a single backup data center
D) The use of open-source software

A

Answer: B) Cost, risk appetite, and complexity of the infrastructure
Explanation: Continuity of operations depends on available funding, the organization’s tolerance for risk, and the complexity of maintaining redundant systems.

115
Q

Which of the following best represents the infrastructure component of capacity planning?
A) Hiring additional IT personnel to manage network expansion
B) Upgrading routers, switches, and storage to support higher traffic loads
C) Encrypting network traffic to improve data confidentiality
D) Implementing a cloud-based backup solution

A

Answer: B) Upgrading routers, switches, and storage to support higher traffic loads
Explanation: Infrastructure in capacity planning includes physical networking components like routers, switches, and storage, ensuring the network can handle increased traffic.

116
Q

What is the primary purpose of a snapshot backup?
A) To provide a full backup of a virtual machine at a specific point in time
B) To continuously replicate data between two servers
C) To store only incremental changes made to files
D) To create logs of all system changes for auditing purposes

A

Answer: A) To provide a full backup of a virtual machine at a specific point in time
Explanation: Snapshots capture the exact state of a system or virtual machine (VM) at a given time, allowing for quick recovery or replication.

116
Q

How does an Uninterruptible Power Supply (UPS) help maintain system availability?
A) It generates long-term backup power for a facility
B) It provides short-term power and protects against power fluctuations
C) It automatically restores power to the grid during an outage
D) It reduces energy consumption by managing voltage levels

A

Answer: B) It provides short-term power and protects against power fluctuations
Explanation: A UPS supplies temporary power during an outage, allowing systems to shut down safely or transition to a generator while also stabilizing voltage fluctuations.

117
Q

A company uses a lookup table to store an identifier that replaces a user’s personal information in a database. What security method is being used?
A) Obfuscation
B) Tokenization
C) Masking
D) Segmentation

A

Answer: B) Tokenization
Explanation: Tokenization replaces sensitive data with a unique identifier stored in a lookup table, ensuring that the original data remains secure.

118
Q

A database administrator wants to track all changes made to a system and have the ability to roll back to a previous state. Which backup method should be used?
A) Incremental backup
B) Differential backup
C) Journaling
D) Snapshot

A

Answer: C) Journaling
Explanation: Journaling logs all changes made to a system, allowing for rollback to a specific point in time, which is particularly useful for databases.

119
Q

How does replication contribute to system recovery?
A) It provides a log of system changes for auditing
B) It allows the restoration of an exact copy of a system or network
C) It speeds up the encryption process for stored backups
D) It ensures only the most recent changes are stored in a backup

A

Answer: B) It allows the restoration of an exact copy of a system or network
Explanation: Replication ensures that an identical copy of a system or network is available for quick restoration in case of failure.

120
Q

Which backup consideration affects how often data copies are made?
A) Storage type
B) Replication
C) Frequency
D) Journaling

A

Answer: C) Frequency
Explanation: Backup frequency determines how often backups are performed, based on the organization’s needs and the type of backup strategy used (full, incremental, or differential).

121
Q

What is the biggest drawback of using snapshots for backup purposes?
A) They do not store a complete backup of a system
B) They require extensive logging of all system changes
C) They take up significant storage space
D) They cannot be used to restore a system after failure

A

Answer: C) They take up significant storage space
Explanation: Snapshots store a complete system image, which consumes large amounts of storage compared to incremental or differential backups.

122
Q

What is the key difference between a UPS and a generator?
A) A UPS provides power for extended outages, while a generator is only for short-term use
B) A UPS provides short-term power and stabilizes voltage, while a generator supplies long-term backup power
C) A UPS can only be used for data centers, while generators can be used anywhere
D) A UPS requires an external fuel source, while a generator operates solely on batteries

A

Answer: B) A UPS provides short-term power and stabilizes voltage, while a generator supplies long-term backup power
Explanation: A UPS is designed for short-term power and protects against fluctuations, while generators are used for sustained power during extended outages.