1) With____, you rent IT infrastructure servers and VMs, storage, networks, opertaing systems form
cloud provider on pay-as-you-go basis.
A. Platform as a Service (PaaS)
B. Software as a Service (SaaS)
C. Infrastructure as a Service (IaaS)
D. Security as a Service ( SECaaS)
2)This type of encryption uses one key to encrypt and decrypt.
A. All the listed choices are correct
B. Asymmetric encryption
C. Symmetric encryption
D. Hashing
3) What is the most important date security measure you can take for mobile devices?
A. Data backup
B. Two factor authentications
C. Use of VPN
D. Full hard drive encryption
4)Which layer of the OSI Model ensures that the packets are received without errors and in the correct
order?
A. Transport layer
B. Data-linked layer
C. Session layer
D. Network layer
5) This is a software tool or service that sits between an organization’s on-premises infrastructure and a
cloud provider’s infrastructure allowing the organization to extend the reach of their security policies
beyond their own infrastructure.
A. Cloud Access Security Broker (CASB)
B. Intrusion Detection System (IDS)
C. DNS server
D. Web Application Firewall (WAF)
6) A _______ typically establishes a barrier between a trusted, secure internal
network and another outside network, such as the internet, that is assumed to not be secure or
trusted.
A. Firewall
B. Network Intrusion Detection System
C. Edge router
D. Virtual private network (VPN)
7) _______ is an integrity control
A. None of the listed choices are correct
B. Public Key infrastructure
C. Hashing
D. Encryption
8) Which of the following is one of the most effective data protection methods for both data-in-transit
and data-at-rest?
A. MD5 Hashing
B. Encryption
C. Transport Layer Security (TLS)
D. Digital Certificates
9) This strategy combines something you have, something you know, or something you are in
the authentication process.
A. Least Privilege Principle
B. Multifactor Authentication
C. Authenticator Management
D. Identity management.
10) This defines the process of granting permission to a user or object to perform or obtain something?
A. Authentication
B. Auditing
C. Authorization
D. Access Control Restrictions
11) You are using asymmetric encryption to send a private message. Which key would you use to
encrypt the message?
A. Recipient’s private key
B. Sender’s private key
C. Recipients’ public key
D. Sender’s public key
12) Which of the following security controls is used to extend the network perimeter with the
use of encapsulation and encryption?
A. Network intrusion detection system (NIDS)
B. Network Address Translation (NAT)
C. Virtual Private Network (VPN)
D. Web proxy
13) Which access control model provides access control based on the position or
responsibility an individual fills within an organization?
A. Mandatory Access control
B. Attribute-based Access control
C. Discretionary Access Control
D. Role-based Control
14)Which access control model is the least restrictive model, popular in situations where resource
owners need to allow access and privileges OnDemand?
A. Role-based Access Control
B. Mandatory Access control
C. Attribute- based access control
D. Discretionary access control
15) Access control auditing to track and report on user activity supports the following purposes:
A. Compliance and security reporting
B. SIEM use cases
C. Compliance and Security Reporting plus SIEM Use Cases
D. Identity management
16) VPNs operate at which layer of the OSI model?
A. Layer 5: Session layer
B. Layer 3: Network layer
C. Layer 2: Data-link layer
D. Layer 4: Transport layer
17) Which access control model is most flexible and fine grained of all access control types. Access can
be granted by IP address, time, dates, resources, objects, privileges, or any combination?
A. Discretionary Access Control
B. Mandatory Access control
C. Attribute-based Access Control
D. Role-base Access control
18) You are analyzing a packet and see that it was being routed using a media access control (MAC)
address. At which layer of the OSI model was the packet captured?
A. Network layer
B. Session layer
C. Data-link layer
D. Transport layer