ISC2 - Certified In Cybersecurity
Q1: What is the primary purpose of a cloud security group (CSG) in a public cloud environment?
Option 1: To provide physical security for cloud data centers Option 2: To manage access control for cloud resources Option 3: To optimize cloud resource allocation Option 4: To enforce regulatory compliance in the cloud
Correct Answer: To manage access control for cloud resources
Q2: What is the main advantage of using a symmetric encryption algorithm over an asymmetric encryption algorithm?
Option 1: Symmetric encryption algorithms are faster and more efficient Option 2: Asymmetric encryption algorithms provide better security Option 3: Symmetric encryption algorithms require fewer resources Option 4: Asymmetric encryption algorithms are easier to implement
Correct Answer: Symmetric encryption algorithms are faster and more efficient
Q3: What is the primary purpose of using digital signatures in cryptographic protocols?
Option 1: To encrypt data for secure transmission Option 2: To verify the integrity and authenticity of data Option 3: To generate random cryptographic keys Option 4: To prevent unauthorized access to sensitive information
Correct Answer: To verify the integrity and authenticity of data
Q4: What security feature is commonly used with HTTPS?
Option 1: IPsec Option 2: SSH Option 3: SSL/TLS Option 4: VPN
Correct Answer: SSL/TLS
Q5: Which of the following is a characteristic of Infrastructure as a Service (IaaS)?
Option 1: Fully managed applications Option 2: Pay-as-you-go pricing model Option 3: Predetermined software configurations Option 4: Limited scalability options
Correct Answer: Limited scalability options
Q6: What is the primary purpose of implementing a disaster recovery plan in a cloud environment?
Option 1: To prevent unauthorized access to cloud resources Option 2: To ensure continuous availability of critical services during a disaster Option 3: To optimize cloud resource utilization Option 4: To automate software deployment processes
Correct Answer: To ensure continuous availability of critical services during a disaster
Q7: Which device is used to connect WAN to LAN?
Option 1: Firewalls Option 2: Router Option 3: Hub Option 4: Switch
Correct Answer: Router
Q8: Which cloud service model provides developers with a platform to build, deploy, and manage applications without managing underlying infrastructure?
Option 1: Infrastructure as a Service (IaaS) Option 2: Platform as a Service (PaaS) Option 3: Software as a Service (SaaS) Option 4: Function as a Service (FaaS)
Correct Answer: Platform as a Service (PaaS)
Q9: An attacker intercepts traffic between a user and a server in order to eavesdrop on sensitive information being transmitted. This is an example of what type of attack?
Option 1: On-path Attack Option 2: Spoofing Option 3: Phishing Option 4: Side-channel
Correct Answer: On-path Attack
Q10: Which network security measure is used to authenticate and authorize users and devices connecting to a network?
Option 1: Virtual Private Network (VPN) Option 2: Intrusion Detection System (IDS) Option 3: Network Access Control (NAC) Option 4: Packet Filtering
Correct Answer: Network Access Control (NAC)
Q11: Which port is used by the FTP protocol?
Option 1: 21 Option 2: 22 Option 3: 23 Option 4: 80
Correct Answer: 21
Q12: Which authentication mechanism is commonly used to access cloud resources securely from external networks?
Option 1: Username and password Option 2: Biometric authentication Option 3: OAuth (Open Authorization) Option 4: LDAP (Lightweight Directory Access Protocol)
Correct Answer: Username and password
Q13: Which port is commonly used for SSH?
Option 1: 22 Option 2: 23 Option 3: 80 Option 4: 443
Correct Answer: 22
Q14: What is the primary purpose of data encryption in transit in cloud environments?
Option 1: To prevent unauthorized access to cloud resources Option 2: To protect data from unauthorized disclosure during transmission over networks Option 3: To optimize cloud resource utilization Option 4: To automate software deployment processes
Correct Answer: To protect data from unauthorized disclosure during transmission over networks
Q15: A user receives an email that appears to be from their bank, requesting their login credentials. This is an example of what type of attack?
Option 1: Spoofing Option 2: Phishing Option 3: DOS/DDOS Option 4: Virus
Correct Answer: Phishing
Q16: Which port is used by the SSH protocol for secure file transfers?
Option 1: SFTP Option 2: SCP Option 3: FTPS Option 4: TFTP
Correct Answer: SFTP
Q17: What is the purpose of conducting regular tests and exercises of a Business Continuity Plan (BCP)?
Option 1: To minimize resource utilization during normal operations Option 2: To validate the effectiveness of the plan and identify areas for improvement Option 3: To increase profitability of the organization Option 4: To prevent all types of disasters from occurring
Correct Answer: To validate the effectiveness of the plan and identify areas for improvement
Q18: What is the main advantage of using a cloud access security broker (CASB) solution in cloud environments?
Option 1: To prevent distributed denial of service (DDoS) attacks Option 2: To monitor and control data traffic between on-premises and cloud environments Option 3: To encrypt data stored in cloud databases Option 4: To optimize cloud resource utilization
Correct Answer: To monitor and control data traffic between on-premises and cloud environments
Q19: What is the purpose of a Business Continuity Plan (BCP)?
Option 1: To prevent all types of disasters from occurring Option 2: To ensure the organization can continue critical business operations during and after a disaster Option 3: To optimize resource utilization during normal operations Option 4: To increase profitability
Correct Answer: To ensure the organization can continue critical business operations during and after a disaster
Q20: Which type of attack involves flooding a network or server with traffic, rendering it unavailable to legitimate users?
Option 1: DOS/DDOS Option 2: Spoofing Option 3: Phishing Option 4: Virus
Correct Answer: DOS/DDOS
Q21: Which cloud deployment model provides dedicated infrastructure for a single organization?
Option 1: Public cloud Option 2: Private cloud Option 3: Hybrid cloud Option 4: Community cloud
Correct Answer: Private cloud
Q22: What is the primary goal of cloud access security brokers (CASBs)?
Option 1: To provide identity and access management services Option 2: To monitor and control data traffic between on-premises and cloud environments Option 3: To encrypt data stored in cloud databases Option 4: To optimize cloud resource allocation
Correct Answer: To monitor and control data traffic between on-premises and cloud environments
Q23: What is the primary purpose of data encryption in transit in cloud environments?
Option 1: To prevent unauthorized access to cloud resources Option 2: To protect data from unauthorized disclosure during transmission over networks Option 3: To optimize cloud resource utilization Option 4: To automate software deployment processes
Correct Answer: To protect data from unauthorized disclosure during transmission over networks
Q24: Which encryption protocol is commonly used to secure data transmitted over wireless networks?
Option 1: WPA2 (Wi-Fi Protected Access 2) Option 2: SSL (Secure Sockets Layer) Option 3: TLS (Transport Layer Security) Option 4: AES (Advanced Encryption Standard)
Correct Answer: WPA2 (Wi-Fi Protected Access 2)
Q25: How does IPSec protect against replay attacks?
Option 1: By encrypting all network traffic Option 2: By using digital signatures Option 3: By using sequence numbers Option 4: By limiting access to the network
Correct Answer: By using sequence numbers
Q26: Which cloud deployment model provides a combination of private and public cloud resources?
Option 1: Public cloud Option 2: Private cloud Option 3: Hybrid cloud Option 4: Community cloud
Correct Answer: Hybrid cloud
Q27: Which port is used by the Telnet protocol?
Option 1: 23 Option 2: 21 Option 3: 22 Option 4: 80
Correct Answer: 23
Q28: Which authentication mechanism is commonly used to access cloud resources securely from external networks?
Option 1: Username and password Option 2: Biometric authentication Option 3: OAuth (Open Authorization) Option 4: LDAP (Lightweight Directory Access Protocol)
Correct Answer: OAuth (Open Authorization)
Q29: What is the primary purpose of using role-based access control (RBAC) in a cloud environment?
Option 1: To prevent distributed denial of service (DDoS) attacks Option 2: To enforce regulatory compliance Option 3: To monitor user activities and access patterns Option 4: To restrict access to cloud resources based on users' roles and responsibilities
Correct Answer: To restrict access to cloud resources based on users' roles and responsibilities
Q30: What is the primary purpose of network segmentation in cloud environments?
Option 1: To increase network bandwidth Option 2: To reduce latency for cloud applications Option 3: To isolate sensitive workloads and data from potential threats Option 4: To automate network provisioning processes
Correct Answer: To isolate sensitive workloads and data from potential threats
Q31: Which of the following is an example of a registered port?
Option 1: Microsoft SQL Server Option 2: RADIUS authentication Option 3: HTTP Option 4: SMB
Correct Answer: Microsoft SQL Server
Q32: What is the purpose of implementing a Virtual Private Network (VPN) in a network?
Option 1: To optimize network performance Option 2: To securely connect remote users and devices to a private network over the internet Option 3: To prevent physical access to network devices Option 4: To monitor network traffic for compliance purposes
Correct Answer: To securely connect remote users and devices to a private network over the internet
Q33: Which cloud service model provides ready-to-use software applications over the internet?
Option 1: Infrastructure as a Service (IaaS) Option 2: Platform as a Service (PaaS) Option 3: Software as a Service (SaaS) Option 4: Function as a Service (FaaS)
Correct Answer: Software as a Service (SaaS)
Q34: An organization is experiencing issues with their VPN connection, causing frequent disconnects. Which OSI layer is most likely affected by this issue?
Option 1: Application Layer Option 2: Transport Layer Option 3: Network Layer Option 4: Physical Layer
Correct Answer: Transport Layer
Q35: Which cryptographic algorithm is vulnerable to collision attacks and should not be used for generating digital signatures?
Option 1: AES (Advanced Encryption Standard) Option 2: RSA (Rivest-Shamir-Adleman) Option 3: MD5 (Message Digest Algorithm 5) Option 4: SHA-256 (Secure Hash Algorithm 256-bit)
Correct Answer: MD5 (Message Digest Algorithm 5)
Q36: What is the primary purpose of a distributed denial of service (DDoS) mitigation service in cloud environments?
Option 1: To prevent unauthorized access to cloud resources Option 2: To monitor and analyze network traffic patterns Option 3: To detect and block malicious traffic targeting cloud services Option 4: To optimize cloud resource utilization
Correct Answer: To detect and block malicious traffic targeting cloud services
Q37: Which cloud service model provides ready-to-use software applications over the internet?
Option 1: Infrastructure as a Service (IaaS) Option 2: Platform as a Service (PaaS) Option 3: Software as a Service (SaaS) Option 4: Function as a Service (FaaS)
Correct Answer: Software as a Service (SaaS)
Q38: Which of the following would be considered an endpoint?
Option 1: Software task Option 2: Router Option 3: Firewall Option 4: Laptop
Correct Answer: Laptop
Q39: Which encryption algorithm is commonly used to protect data in transit between cloud services and users' devices?
Option 1: AES (Advanced Encryption Standard) Option 2: RSA (Rivest-Shamir-Adleman) Option 3: DES (Data Encryption Standard) Option 4: MD5 (Message Digest Algorithm 5)
Correct Answer: AES (Advanced Encryption Standard)
Q40: What is an IPv4 address?
Option 1: A 128-bit address used to uniquely identify devices on a network. Option 2: A 32-bit address used to uniquely identify devices on a network. Option 3: An address used for internal network use only. Option 4: An address used for documentation purposes only.
Correct Answer: A 32-bit address used to uniquely identify devices on a network.
Q41: A user receives an email that appears to be from their bank, requesting their login credentials. This is an example of what type of attack?
Option 1: Spoofing Option 2: Phishing Option 3: DOS/DDOS Option 4: Virus
Correct Answer: Phishing
Q42: Which cryptographic attack targets the process of intercepting and altering communication between two parties?
Option 1: Man-in-the-middle (MITM) attack Option 2: Brute-force attack Option 3: Dictionary attack Option 4: Rainbow table attack
Correct Answer: Man-in-the-middle (MITM) attack
Q43: Which type of malware encrypts a user's files and demands payment in exchange for the decryption key? a. Ransomware
Option 1: Ransomware Option 2: Worm Option 3: Trojan Option 4: Virus
Correct Answer: Ransomware
Q44: What security control is used to protect data in transit between cloud services and users' devices?
Option 1: Data encryption at rest Option 2: Network intrusion detection systems (NIDS) Option 3: Transport Layer Security (TLS) Option 4: Role-based access control (RBAC)
Correct Answer: Transport Layer Security (TLS)
Q45: Which component of a Business Continuity Plan (BCP) identifies critical business functions and the resources required to support them?
Option 1: Plan development and testing Option 2: Risk assessment Option 3: Business impact analysis (BIA) Option 4: Plan implementation
Correct Answer: Business impact analysis (BIA)
Q46: What is the primary purpose of data encryption in transit in cloud environments?
Option 1: To prevent unauthorized access to cloud resources Option 2: To protect data from unauthorized disclosure during transmission over networks Option 3: To optimize cloud resource utilization Option 4: To automate software deployment processes
Correct Answer: To protect data from unauthorized disclosure during transmission over networks
Q47: What is the primary objective of a disaster recovery plan in cloud computing?
Option 1: To prevent unauthorized access to cloud resources Option 2: To ensure continuous availability of critical services during a disaster Option 3: To optimize cloud resource utilization Option 4: To automate software deployment processes
Correct Answer: To ensure continuous availability of critical services during a disaster
Q48: What is the primary purpose of using a digital certificate in public key infrastructure (PKI)?
Option 1: To encrypt data for secure transmission Option 2: To authenticate the identity of users and devices Option 3: To generate random cryptographic keys Option 4: To prevent buffer overflow attacks
Correct Answer: To authenticate the identity of users and devices
Q49: A hacker gains access to a company's network and begins to intercept network traffic in order to steal login credentials. Which OSI layer is being attacked?
Option 1: Physical layer Option 2: Data link layer Option 3: Network layer Option 4: Application layer
Correct Answer: Data link layer
Q50: Which security control is used to verify the integrity and authenticity of cloud service providers?
Option 1: Service level agreements (SLAs) Option 2: Cloud security certifications Option 3: Encryption protocols Option 4: Intrusion detection systems (IDS)
Correct Answer: Cloud security certifications
Q51: Which encryption algorithm is commonly used to protect data in transit in cloud environments?
Option 1: AES (Advanced Encryption Standard) Option 2: DES (Data Encryption Standard) Option 3: RSA (Rivest-Shamir-Adleman) Option 4: MD5 (Message Digest Algorithm 5)
Correct Answer: AES (Advanced Encryption Standard)
Q52: Which of the following is a characteristic of a public cloud deployment model?
Option 1: Dedicated infrastructure for a single organization Option 2: Limited scalability options Option 3: Shared infrastructure for multiple organizations Option 4: Full control over hardware and software configurations
Correct Answer: Shared infrastructure for multiple organizations
Q53: At which layer of the TCP/IP protocol stack does a firewall operate?
Option 1: Layer 1 Option 2: Layer 2 Option 3: Layer 3 Option 4: Layer 4
Correct Answer: Layer 4
Q54: What is the primary purpose of using a salt when hashing passwords?
Option 1: To add flavor to the password Option 2: To increase the entropy of the hashed passwords Option 3: To make the passwords easier to crack Option 4: To decrease the security of the hashing algorithm
Correct Answer: To increase the entropy of the hashed passwords
Q55: Which security control is used to prevent unauthorized access to sensitive data in cloud databases?
Option 1: Role-based access control (RBAC) Option 2: Network intrusion detection systems (NIDS) Option 3: Distributed denial of service (DDoS) mitigation Option 4: Security information and event management (SIEM)
Correct Answer: Role-based access control (RBAC)
Q56: What protocol is associated with port 53?
Option 1: DNS Option 2: SMTP Option 3: HTTP Option 4: HTTPS
Correct Answer: DNS
Q57: What layer of the OSI model is the target of a ping flood attack?
Option 1: Layer 3 Option 2: Layer 4 Option 3: Layer 5 Option 4: Layer 6
Correct Answer: Layer 3
Q58: What is the potential impact of an IPSec replay attack?
Option 1: Unauthorized access to network resources Option 2: Disruption of network communication Option 3: Modification of network traffic Option 4: All of the above
Correct Answer: All of the above
Q59: Which security control is used to protect data in transit between cloud services and users' devices?
Option 1: Data encryption at rest Option 2: Network intrusion detection systems (NIDS) Option 3: Transport Layer Security (TLS) Option 4: Role-based access control (RBAC)
Correct Answer: Transport Layer Security (TLS)
Q60: What is the primary goal of implementing multi-factor authentication (MFA) in a cloud environment?
Option 1: To prevent unauthorized access to cloud resources Option 2: To optimize cloud resource utilization Option 3: To automate software deployment processes Option 4: To monitor user activities and access patterns
Correct Answer: To prevent unauthorized access to cloud resources
Q61: Which cloud deployment model provides cloud resources exclusively for a specific organization?
Option 1: Hybrid cloud Option 2: Public cloud Option 3: Private cloud Option 4: Community cloud
Correct Answer: Private cloud
Q62: What is the primary purpose of implementing network segmentation?
Option 1: To prevent unauthorized access to network resources Option 2: To increase the speed of data transmission across the network Option 3: To divide a network into smaller subnetworks for improved security and performance Option 4: To monitor network traffic for compliance purposes
Correct Answer: To divide a network into smaller subnetworks for improved security and performance
Q63: Which encryption algorithm is commonly used to protect data at rest in cloud storage?
Option 1: AES (Advanced Encryption Standard) Option 2: RSA (Rivest-Shamir-Adleman) Option 3: DES (Data Encryption Standard) Option 4: MD5 (Message Digest Algorithm 5)
Correct Answer: AES (Advanced Encryption Standard)
Q64: A user clicks on an attachment in an email that they believe is from a friend, which then installs malicious software on their computer. This is an example of what type of malware?
Option 1: Worm Option 2: Virus Option 3: Trojan Option 4: Ransomware
Correct Answer: Trojan
Q65: A company has been experiencing network connectivity issues that have been traced to a problem with the cabling. Which OSI layer is affected by this issue?
Option 1: Application Layer Option 2: Transport Layer Option 3: Network Layer Option 4: Physical Layer
Correct Answer: Physical Layer
Q66: What is the primary goal of data loss prevention (DLP) solutions in cloud environments?
Option 1: To prevent unauthorized access to cloud resources Option 2: To monitor and control data movement within and outside the organization Option 3: To optimize cloud resource utilization Option 4: To automate software deployment processes
Correct Answer: To monitor and control data movement within and outside the organization
Q67: A hacker uses a distributed denial of service (DDoS) attack to flood a company's network with traffic, rendering it unable to function properly. Which OSI layer is being attacked?
Option 1: Physical layer Option 2: Data link layer Option 3: Network layer Option 4: Transport layer
Correct Answer: Network layer
Q68: What is the well-known port for SMTP?
Option 1: 25 Option 2: 80 Option 3: 443 Option 4: 22
Correct Answer: 25
Q69: What are registered ports used for?
Option 1: Proprietary applications from vendors and developers Option 2: Common protocols at the core of TCP/IP model Option 3: Used for Web servers Option 4: Used for inhouse or opensource applications
Correct Answer: Proprietary applications from vendors and developers
Q70: Which cloud service model provides developers with a platform to build, deploy, and manage applications without managing underlying infrastructure?
Option 1: Infrastructure as a Service (IaaS) Option 2: Platform as a Service (PaaS) Option 3: Software as a Service (SaaS) Option 4: Function as a Service (FaaS)
Correct Answer: Platform as a Service (PaaS)
Q71: What layer of the OSI model is the target of a port scanning attack?
Option 1: Layer 1 Option 2: Layer 2 Option 3: Layer 3 Option 4: Layer 4
Correct Answer: Layer 4
Q72: A user reports that they are unable to access a specific website. Which OSI layer is most likely affected by this issue?
Option 1: Application Layer Option 2: Transport Layer Option 3: Network Layer Option 4: Data Link Layer
Correct Answer: Application Layer
Q73: What is the primary objective of implementing a cloud access security broker (CASB) solution?
Option 1: To manage cloud service provider relationships Option 2: To optimize cloud resource utilization Option 3: To monitor and control data traffic between on-premises and cloud environments Option 4: To encrypt data stored in cloud databases
Correct Answer: To monitor and control data traffic between on-premises and cloud environments
Q74: Which cloud deployment model provides cloud resources exclusively for a specific organization?
Option 1: Public cloud Option 2: Private cloud Option 3: Hybrid cloud Option 4: Community cloud
Correct Answer: Private cloud
Q75: What is the purpose of a cloud security posture management (CSPM) tool?
Option 1: To monitor and enforce compliance with security policies in cloud environments Option 2: To optimize cloud resource allocation Option 3: To encrypt data stored in cloud databases Option 4: To automate software deployment processes
Correct Answer: To monitor and enforce compliance with security policies in cloud environments
Q76: What security control is used to protect data at rest in cloud storage?
Option 1: Role-based access control (RBAC) Option 2: Data encryption Option 3: Intrusion detection systems (IDS) Option 4: Multi-factor authentication (MFA)
Correct Answer: Data encryption
Q77: What is the main advantage of using a cloud access security broker (CASB) solution in cloud environments?
Option 1: To prevent distributed denial of service (DDoS) attacks Option 2: To monitor and control data traffic between on-premises and cloud environments Option 3: To encrypt data stored in cloud databases Option 4: To optimize cloud resource utilization
Correct Answer: To monitor and control data traffic between on-premises and cloud environments
Q78: What is the primary goal of a Disaster Recovery Plan (DRP)?
Option 1: To prevent all types of disasters from occurring Option 2: To ensure the continuity of critical business operations Option 3: To optimize resource utilization during normal operations Option 4: To increase profitability
Correct Answer: To ensure the continuity of critical business operations
Q79: Which cloud deployment model provides dedicated infrastructure for a single organization?
Option 1: Public cloud Option 2: Private cloud Option 3: Hybrid cloud Option 4: Community cloud
Correct Answer: Private cloud
Q80: What protocol is associated with port 80?
Option 1: HTTP Option 2: FTP Option 3: SSH Option 4: Telnet
Correct Answer: HTTP
Q81: What is the purpose of a virtual private cloud (VPC)?
Option 1: To provide dedicated physical servers to customers Option 2: To isolate network traffic within a public cloud environment Option 3: To optimize virtual machine performance Option 4: To enforce strict access controls on cloud resources
Correct Answer: To isolate network traffic within a public cloud environment
Q82: What is the primary purpose of a distributed denial of service (DDoS) mitigation service in cloud environments?
Option 1: To prevent unauthorized access to cloud resources Option 2: To monitor and analyze network traffic patterns Option 3: To detect and block malicious traffic targeting cloud services Option 4: To optimize cloud resource utilization
Correct Answer: To detect and block malicious traffic targeting cloud services
Q83: Which security control is used to detect and respond to security incidents in cloud environments?
Option 1: Multi-factor authentication (MFA) Option 2: Intrusion detection systems (IDS) Option 3: Role-based access control (RBAC) Option 4: Data encryption at rest
Correct Answer: Intrusion detection systems (IDS)
Q84: What is the primary goal of implementing a disaster recovery plan in a cloud environment?
Option 1: To prevent unauthorized access to cloud resources Option 2: To ensure continuous availability of critical services during a disaster Option 3: To optimize cloud resource utilization Option 4: To automate software deployment processes
Correct Answer: To ensure continuous availability of critical services during a disaster
Q85: A user reports that they are unable to access a specific website. Which OSI layer is most likely affected by this issue?
Option 1: Application Layer Option 2: Transport Layer Option 3: Network Layer Option 4: Data Link Layer
Correct Answer: Application Layer
Q86: What layer of the OSI model is the target of a man-in-the-middle (MITM) attack?
Option 1: Layer 2 Option 2: Layer 3 Option 3: Layer 4 Option 4: Layer 7
Correct Answer: Layer 3
Q87: What is the main advantage of using a cloud access security broker (CASB) solution in cloud environments?
Option 1: To prevent distributed denial of service (DDoS) attacks Option 2: To monitor and control data traffic between on-premises and cloud environments Option 3: To encrypt data stored in cloud databases Option 4: To optimize cloud resource utilization
Correct Answer: To monitor and control data traffic between on-premises and cloud environments
Q88: Which cloud service model provides access to virtualized computing resources over the internet?
Option 1: Infrastructure as a Service (IaaS) Option 2: Software as a Service (SaaS) Option 3: Platform as a Service (PaaS) Option 4: Function as a Service (FaaS)
Correct Answer: Infrastructure as a Service (IaaS)
Q89: What is the primary goal of implementing role-based access control (RBAC) in a cloud environment?
Option 1: To prevent distributed denial of service (DDoS) attacks Option 2: To enforce regulatory compliance Option 3: To monitor user activities and access patterns Option 4: To restrict access to cloud resources based on users' roles and responsibilities
Correct Answer: To restrict access to cloud resources based on users' roles and responsibilities
Q90: What is the primary purpose of using encryption at rest in cloud storage?
Option 1: To prevent unauthorized access to cloud resources Option 2: To protect data from unauthorized disclosure during transmission over networks Option 3: To optimize cloud resource utilization Option 4: To protect data stored in cloud storage from unauthorized access
Correct Answer: To protect data stored in cloud storage from unauthorized access
Q91: Which phase of the Business Continuity Planning (BCP) process involves identifying potential risks and threats to an organization's operations?
Option 1: Risk assessment Option 2: Business impact analysis Option 3: Plan development and testing Option 4: Plan implementation
Correct Answer: Risk assessment
Q92: Which authentication mechanism is commonly used to access cloud resources securely from external networks?
Option 1: Username and password Option 2: Biometric authentication Option 3: OAuth (Open Authorization) Option 4: LDAP (Lightweight Directory Access Protocol)
Correct Answer: OAuth (Open Authorization)
Q93: What is the primary purpose of using network segmentation in a cloud environment?
Option 1: To optimize network bandwidth Option 2: To increase network latency Option 3: To isolate workloads and data for security purposes Option 4: To automate network provisioning processes
Correct Answer: To isolate workloads and data for security purposes
Q94: Which cloud service model provides developers with a platform to build, deploy, and manage applications without managing underlying infrastructure?
Option 1: Infrastructure as a Service (IaaS) Option 2: Platform as a Service (PaaS) Option 3: Software as a Service (SaaS) Option 4: Function as a Service (FaaS)
Correct Answer: Platform as a Service (PaaS)
Q95: What is the primary purpose of a cloud security group (CSG) in a public cloud environment?
Option 1: To provide physical security for cloud data centers Option 2: To manage access control for cloud resources Option 3: To optimize cloud resource allocation Option 4: To enforce regulatory compliance in the cloud
Correct Answer: To manage access control for cloud resources
Q96: Which type of malware encrypts a user's files and demands payment in exchange for the decryption key?
Option 1: Ransomware Option 2: Worm Option 3: Trojan Option 4: Virus
Correct Answer: Ransomware
Q97: What is the main advantage of using a cloud access security broker (CASB) solution in cloud environments?
Option 1: To prevent distributed denial of service (DDoS) attacks Option 2: To monitor and control data traffic between on-premises and cloud environments Option 3: To encrypt data stored in cloud databases Option 4: To optimize cloud resource utilization
Correct Answer: To monitor and control data traffic between on-premises and cloud environments
Q98: What is the primary purpose of using a nonce in cryptographic protocols?
Option 1: To add randomness to the encryption process Option 2: To increase the security of the cryptographic keys Option 3: To prevent replay attacks Option 4: To authenticate the parties involved in the communication
Correct Answer: To prevent replay attacks
Q99: A hacker uses a DNS spoofing attack to redirect a user to a fake website that looks like a legitimate one. Once the user enters their login credentials, the hacker steals the information. Which OSI layer is being attacked?
Option 1: Physical layer Option 2: Data link layer Option 3: Network layer Option 4: Application layer
Correct Answer: Application layer
Q100: An attacker intercepts traffic between a user and a server in order to eavesdrop on sensitive information being transmitted. This is an example of what type of attack?
Option 1: On-path Attack Option 2: Spoofing Option 3: Phishing Option 4: Side-channel
Correct Answer: On-path Attack
Q101: Which security control is used to monitor and analyze user activities and access patterns in cloud environments?
Option 1: Security information and event management (SIEM) Option 2: Intrusion detection systems (IDS) Option 3: Multi-factor authentication (MFA) Option 4: Role-based access control (RBAC)
Correct Answer: Security information and event management (SIEM)
Q102: What is the primary purpose of using role-based access control (RBAC) in a cloud environment?
Option 1: To prevent distributed denial of service (DDoS) attacks Option 2: To enforce regulatory compliance Option 3: To monitor user activities and access patterns Option 4: To restrict access to cloud resources based on users' roles and responsibilities
Correct Answer: To restrict access to cloud resources based on users' roles and responsibilities
Q103: What is the range of dynamic or private ports?
Option 1: 49152-65535 Option 2: 0-1023 Option 3: 1024-49151 Option 4: none of the above
Correct Answer: 49152-65535
Q104: Which security control is designed to detect and prevent buffer overflow attacks?
Option 1: Intrusion detection systems (IDS) Option 2: Firewalls Option 3: Antivirus software Option 4: Input validation mechanisms
Correct Answer: Input validation mechanisms
Q105: What layer of the OSI model is the target of a MAC flooding attack?
Option 1: Layer 2 Option 2: Layer 3 Option 3: Layer 4 Option 4: Layer 7
Correct Answer: Layer 2
Q106: What is the primary purpose of implementing multi-factor authentication (MFA) in a cloud environment?
Option 1: To optimize cloud resource utilization Option 2: To prevent unauthorized access to cloud resources Option 3: To automate software deployment processes Option 4: To monitor user activities and access patterns
Correct Answer: To prevent unauthorized access to cloud resources
Q107: What is the main purpose of an Incident Response Plan (IRP)?
Option 1: To improve employee productivity Option 2: To prevent all security incidents from occurring Option 3: To allocate resources for routine maintenance tasks Option 4: To provide guidelines and procedures for responding to and mitigating security incidents
Correct Answer: To provide guidelines and procedures for responding to and mitigating security incidents
Q108: What is the primary purpose of a cloud security group (CSG) in a public cloud environment?
Option 1: To provide physical security for cloud data centers Option 2: To manage access control for cloud resources Option 3: To optimize cloud resource allocation Option 4: To enforce regulatory compliance in the cloud
Correct Answer: To manage access control for cloud resources
Q109: What is the primary goal of implementing role-based access control (RBAC) in a cloud environment?
Option 1: To prevent distributed denial of service (DDoS) attacks Option 2: To enforce regulatory compliance Option 3: To monitor user activities and access patterns Option 4: To restrict access to cloud resources based on users' roles and responsibilities
Correct Answer: To restrict access to cloud resources based on users' roles and responsibilities
Q110: Which type of attack involves flooding a network or server with traffic, rendering it unavailable to legitimate users?
Option 1: DOS/DDOS Option 2: Spoofing Option 3: Phishing Option 4: Virus
Correct Answer: DOS/DDOS
Q111: What is the purpose of a distributed denial of service (DDoS) mitigation service in cloud environments?
Option 1: To prevent unauthorized access to cloud resources Option 2: To monitor and analyze network traffic patterns Option 3: To detect and block malicious traffic targeting cloud services Option 4: To optimize cloud resource utilization
Correct Answer: To detect and block malicious traffic targeting cloud services
Q112: A user clicks on an attachment in an email that they believe is from a friend, which then installs malicious software on their computer. This is an example of what type of malware?
Option 1: Worm Option 2: Virus Option 3: Trojan Option 4: Ransomware
Correct Answer: Trojan
Q113: Which cloud deployment model provides a combination of private and public cloud resources?
Option 1: Public cloud Option 2: Private cloud Option 3: Hybrid cloud Option 4: Community cloud
Correct Answer: Hybrid cloud
Q114: Which of the following is a characteristic of a public cloud deployment model?
Option 1: Dedicated infrastructure for a single organization Option 2: Limited scalability options Option 3: Shared infrastructure for multiple organizations Option 4: Full control over hardware and software configurations
Correct Answer: Shared infrastructure for multiple organizations
Q115: What security measure can help prevent unauthorized access to cloud resources through stolen or compromised credentials?
Option 1: Intrusion detection systems (IDS) Option 2: Multi-factor authentication (MFA) Option 3: Data encryption at rest Option 4: Network segmentation
Correct Answer: Multi-factor authentication (MFA)
Q116: A hacker uses a distributed denial of service (DDoS) attack to flood a company's network with traffic, rendering it unable to function properly. Which OSI layer is being attacked?
Option 1: Physical layer Option 2: Data link layer Option 3: Network layer Option 4: Transport layer
Correct Answer: Network layer
Q117: What is the primary objective of implementing a cloud access security broker (CASB) solution?
Option 1: To manage cloud service provider relationships Option 2: To optimize cloud resource utilization Option 3: To monitor and control data traffic between on-premises and cloud environments Option 4: To encrypt data stored in cloud databases
Correct Answer: To monitor and control data traffic between on-premises and cloud environments
Q118: What layer of the OSI model is the target of a SYN flood attack?
Option 1: Layer 4 Option 2: Layer 5 Option 3: Layer 6 Option 4: Layer 7
Correct Answer: Layer 4
Q119: What security measure can help prevent unauthorized access to cloud resources through stolen or compromised credentials?
Option 1: Intrusion detection systems (IDS) Option 2: Multi-factor authentication (MFA) Option 3: Data encryption at rest Option 4: Network segmentation
Correct Answer: Multi-factor authentication (MFA)
Q120: Which encryption algorithm is commonly used to protect data in transit between cloud services and users' devices?
Option 1: AES (Advanced Encryption Standard) Option 2: RSA (Rivest-Shamir-Adleman) Option 3: DES (Data Encryption Standard) Option 4: MD5 (Message Digest Algorithm 5)
Correct Answer: AES (Advanced Encryption Standard)
Q121: An organization is experiencing issues with their VPN connection, causing frequent disconnects. Which OSI layer is most likely affected by this issue?
Option 1: Application Layer Option 2: Transport Layer Option 3: Network Layer Option 4: Physical Layer
Correct Answer: Transport Layer
Q122: Which cloud service model provides ready-to-use software applications over the internet?
Option 1: Platform as a Service (PaaS) Option 2: Infrastructure as a Service (IaaS) Option 3: Software as a Service (SaaS) Option 4: Function as a Service (FaaS)
Correct Answer: Software as a Service (SaaS)
Q123: Which authentication mechanism is commonly used to access cloud resources securely from external networks?
Option 1: Username and password Option 2: Biometric authentication Option 3: OAuth (Open Authorization) Option 4: LDAP (Lightweight Directory Access Protocol)
Correct Answer: OAuth (Open Authorization)
Q124: A company has been experiencing network connectivity issues that have been traced to a problem with the cabling. Which OSI layer is affected by this issue?
Option 1: Application Layer Option 2: Transport Layer Option 3: Network Layer Option 4: Physical Layer
Correct Answer: Physical Layer
Q125: What is an IPv4 address?
Option 1: A 128-bit address used to uniquely identify devices on a network. Option 2: A 32-bit address used to uniquely identify devices on a network. Option 3: An address used for internal network use only. Option 4: An address used for documentation purposes only.
Correct Answer: A 32-bit address used to uniquely identify devices on a network.
Q126: Which security control is used to detect and respond to security incidents in cloud environments?
Option 1: Intrusion detection systems (IDS) Option 2: Multi-factor authentication (MFA) Option 3: Role-based access control (RBAC) Option 4: Data encryption at rest
Correct Answer: Intrusion detection systems (IDS)
Q127: Which security control is used to prevent unauthorized access to sensitive data in cloud databases?
Option 1: Role-based access control (RBAC) Option 2: Network intrusion detection systems (NIDS) Option 3: Distributed denial of service (DDoS) mitigation Option 4: Security information and event management (SIEM)
Correct Answer: Role-based access control (RBAC)
Q128: What is the primary purpose of a cloud access security broker (CASB) solution?
Option 1: To manage cloud service provider relationships Option 2: To optimize cloud resource utilization Option 3: To monitor and control data traffic between on-premises and cloud environments Option 4: To encrypt data stored in cloud databases
Correct Answer: To monitor and control data traffic between on-premises and cloud environments
Q129: Which cloud deployment model provides dedicated infrastructure for a single organization?
Option 1: Public cloud Option 2: Private cloud Option 3: Hybrid cloud Option 4: Community cloud
Correct Answer: Private cloud
Q130: What is the range of well-known ports?
Option 1: 0-1023 Option 2: 1024-49151 Option 3: 1024-49151 Option 4: none of the above
Correct Answer: 0-1023
Q131: What is the primary purpose of implementing a firewall in a network?
Option 1: To optimize network performance Option 2: To monitor and control incoming and outgoing network traffic Option 3: To encrypt data transmitted over the network Option 4: To prevent physical access to network devices
Correct Answer: To monitor and control incoming and outgoing network traffic
Q132: Which of the following is a characteristic of a private cloud deployment model?
Option 1: Shared infrastructure for multiple organizations Option 2: Limited scalability options Option 3: Dedicated infrastructure for a single organization Option 4: Full control over hardware and software configurations
Correct Answer: Dedicated infrastructure for a single organization
Q133: Which encryption algorithm is commonly used to protect data at rest in cloud storage?
Option 1: AES (Advanced Encryption Standard) Option 2: RSA (Rivest-Shamir-Adleman) Option 3: DES (Data Encryption Standard) Option 4: MD5 (Message Digest Algorithm 5)
Correct Answer: AES (Advanced Encryption Standard)
Q134: What is an IP address?
Option 1: A physical address used to connect multiple devices in a network Option 2: An address that represents the network interface within the network Option 3: An address that denotes the vendor or manufacturer of the physical network interface Option 4: A logical address associated with a unique network interface within the network
Correct Answer: A logical address associated with a unique network interface within the network
Q135: What is the difference between a hub and a switch?
Option 1: A hub is smarter than a switch. Option 2: A switch is less likely to be seen in home networks. Option 3: A switch can create separate broadcast domains when used to create VLANs. Option 4: A switch retransmits traffic to all devices, while a switch routes traffic to a specific device.
Correct Answer: A switch retransmits traffic to all devices, while a switch routes traffic to a specific device.
Q136: Which device is used to control traffic flow on networks?
Option 1: switch Option 2: Firewalls Option 3: hub Option 4: router
Correct Answer: switch
Q137: Which protocol is used for secure email?
Option 1: SMTPS Option 2: IMAPS Option 3: POP3S Option 4: All of the above
Correct Answer: All of the above
Q138: Which phase of the Incident Response Plan (IRP) process involves containing the impact of a security incident and mitigating further damage?
Option 1: Preparation and planning Option 2: Detection and analysis Option 3: Response and mitigation Option 4: Recovery and post-incident activities
Correct Answer: Response and mitigation
Q139: What layer of the OSI model is the target of a buffer overflow attack?
Option 1: Layer 5 Option 2: Layer 6 Option 3: Layer 7 Option 4: Layer 8
Correct Answer: Layer 7
Q140: What does the "shared responsibility model" in cloud computing refer to?
Option 1: Responsibility for data encryption Option 2: Division of security responsibilities between the cloud provider and the customer Option 3: Ownership of physical infrastructure Option 4: Compliance with industry regulations
Correct Answer: Division of security responsibilities between the cloud provider and the customer
Q141: What is the primary purpose of using network segmentation in a cloud environment?
Option 1: To optimize network bandwidth Option 2: To increase network latency Option 3: To isolate workloads and data for security purposes Option 4: To automate network provisioning processes
Correct Answer: To isolate workloads and data for security purposes
Q142: How does subnetting help to improve network performance?
Option 1: By reducing network congestion Option 2: By increasing network bandwidth Option 3: By improving network security Option 4: By simplifying network management
Correct Answer: By reducing network congestion
Q143: Which cloud service model provides ready-to-use software applications over the internet?
Option 1: Infrastructure as a Service (IaaS) Option 2: Platform as a Service (PaaS) Option 3: Software as a Service (SaaS) Option 4: Function as a Service (FaaS)
Correct Answer: Software as a Service (SaaS)
Q144: Which port is commonly used for HTTPS?
Option 1: 80 Option 2: 443 Option 3: 446 Option 4: 22
Correct Answer: 443
Q145: Which security control is used to prevent unauthorized access to sensitive data in cloud databases?
Option 1: Role-based access control (RBAC) Option 2: Network intrusion detection systems (NIDS) Option 3: Distributed denial of service (DDoS) mitigation Option 4: Security information and event management (SIEM)
Correct Answer: Role-based access control (RBAC)
Q146: What security measure can help prevent unauthorized access to cloud resources through stolen or compromised credentials?
Option 1: Intrusion detection systems (IDS) Option 2: Multi-factor authentication (MFA) Option 3: Data encryption at rest Option 4: Network segmentation
Correct Answer: Multi-factor authentication (MFA)
Q147: What is the primary purpose of implementing network encryption in a cloud environment?
Option 1: To prevent unauthorized access to cloud resources Option 2: To protect data from unauthorized disclosure during transmission over networks Option 3: To optimize cloud resource utilization Option 4: To automate software deployment processes
Correct Answer: To protect data from unauthorized disclosure during transmission over networks
Q148: What is the primary purpose of using role-based access control (RBAC) in a cloud environment?
Option 1: To monitor user activities and access patterns Option 2: To prevent distributed denial of service (DDoS) attacks Option 3: To enforce regulatory compliance Option 4: To restrict access to cloud resources based on users' roles and responsibilities
Correct Answer: To restrict access to cloud resources based on users' roles and responsibilities
Q149: A hacker uses a man-in-the-middle attack to intercept network traffic between two nodes and injects malicious code into the data stream. Which TCP layer is being attacked?
Option 1: Physical layer Option 2: Transport layer Option 3: Network layer Option 4: Application layer
Correct Answer: Transport layer
Q150: Which of the following is an example of a security control used to protect data at rest in cloud storage? )
Option 1: Transport Layer Security (TLS) Option 2: Data encryption Option 3: Intrusion detection systems (IDS) Option 4: Multi-factor authentication (MFA
Correct Answer: Data encryption
Q151: What is an IPSec replay attack?
Option 1: An attack where an attacker attempts to inject packets into an existing session Option 2: An attack where an attacker modifies packets in transit Option 3: An attack where an attacker eavesdrops on network traffic Option 4: An attack where an attacker overloads a network with traffic
Correct Answer: An attack where an attacker attempts to inject packets into an existing session
Q152: What is the primary goal of implementing intrusion detection and prevention systems (IDPS) in a network?
Option 1: To monitor network traffic for compliance purposes Option 2: To optimize network performance Option 3: To detect and respond to malicious activities and security threats Option 4: To prevent physical access to network devices
Correct Answer: To detect and respond to malicious activities and security threats
Q153: A company has noticed that their network performance has been slow lately. After investigating, they discover that their router is not configured properly, leading to network congestion. Which OSI layer is most likely affected by this issue?
Option 1: Application Layer Option 2: Transport Layer Option 3: Network Layer Option 4: Data Link Layer
Correct Answer: Network Layer
Q154: Which cloud service model provides access to virtualized computing resources over the internet?
Option 1: Infrastructure as a Service (IaaS) Option 2: Platform as a Service (PaaS) Option 3: Software as a Service (SaaS) Option 4: Function as a Service (FaaS)
Correct Answer: Infrastructure as a Service (IaaS)
Q155: What is the primary goal of implementing data loss prevention (DLP) solutions in cloud environments?
Option 1: To prevent unauthorized access to cloud resources Option 2: To monitor and control data movement within and outside the organization Option 3: To optimize cloud resource utilization Option 4: To automate software deployment processes
Correct Answer: To monitor and control data movement within and outside the organization
Q156: What is the main advantage of using a rainbow table attack compared to a brute-force attack?
Option 1: Rainbow table attacks are faster and more efficient Option 2: Brute-force attacks are less computationally intensive Option 3: Rainbow table attacks are less likely to succeed Option 4: Brute-force attacks require less memory resources
Correct Answer: Rainbow table attacks are faster and more efficient
Q157: A company has noticed that their network performance has been slow lately. After investigating, they discover that their router is not configured properly, leading to network congestion. Which OSI layer is most likely affected by this issue?
Option 1: Application Layer Option 2: Transport Layer Option 3: Network Layer Option 4: Data Link Layer
Correct Answer: Network Layer
Q158: A hacker sends a specially crafted email with a malicious attachment to an employee of a company. Once the employee downloads and opens the attachment, malware is installed on the computer. Which TCP layer is being attacked?
Option 1: Application layer Option 2: Transport layer Option 3: Network layer Option 4: Physical layer
Correct Answer: Application layer
Q159: What is the primary purpose of using encryption at rest in cloud storage?
Option 1: To prevent unauthorized access to cloud resources Option 2: To optimize cloud resource utilization Option 3: To automate software deployment processes Option 4: To protect data stored in cloud storage from unauthorized access
Correct Answer: To protect data stored in cloud storage from unauthorized access
Q160: Which security control is used to monitor and analyze user activities and access patterns in cloud environments?
Option 1: Security information and event management (SIEM) Option 2: Intrusion detection systems (IDS) Option 3: Multi-factor authentication (MFA) Option 4: Role-based access control (RBAC)
Correct Answer: Security information and event management (SIEM)
Q161: What is the primary goal of data loss prevention (DLP) solutions in cloud environments?
Option 1: To prevent unauthorized access to cloud resources Option 2: To monitor and control data movement within and outside the organization Option 3: To optimize cloud resource utilization Option 4: To automate software deployment processes
Correct Answer: To monitor and control data movement within and outside the organization
Q162: What security measure can help prevent unauthorized access to cloud resources through stolen or compromised credentials?
Option 1: Intrusion detection systems (IDS) Option 2: Multi-factor authentication (MFA) Option 3: Data encryption at rest Option 4: Network segmentation
Correct Answer: Multi-factor authentication (MFA)
Q163: Which cloud service model provides the highest level of abstraction and requires the least management effort by customers?
Option 1: Infrastructure as a Service (IaaS) Option 2: Platform as a Service (PaaS) Option 3: Software as a Service (SaaS) Option 4: Function as a Service (FaaS)
Correct Answer: Software as a Service (SaaS)
Q164: What is the main advantage of using a one-time pad (OTP) encryption scheme?
Option 1: OTP encryption provides perfect secrecy Option 2: OTP encryption is computationally efficient Option 3: OTP encryption requires smaller key sizes Option 4: OTP encryption is resistant to brute-force attacks
Correct Answer: OTP encryption provides perfect secrecy
Q165: What is a key benefit of using containerization in cloud environments?
Option 1: Improved hardware utilization Option 2: Enhanced network security Option 3: Simplified application deployment Option 4: Reduced data transfer costs
Correct Answer: Simplified application deployment
Q166: Which encryption algorithm is commonly used to protect data in transit between cloud services and users' devices?
Option 1: AES (Advanced Encryption Standard) Option 2: RSA (Rivest-Shamir-Adleman) Option 3: DES (Data Encryption Standard) Option 4: MD5 (Message Digest Algorithm 5)
Correct Answer: AES (Advanced Encryption Standard)
Q167: What is the main problem with assigning static privileges to administrative users on a database?
Option 1: Security is dependent upon the login process Option 2: Administrative users may forget their privileges Option 3: Static privileges are more expensive to implement Option 4: Static privileges may not provide enough access
Correct Answer: Security is dependent upon the login process