100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CERTMASTER CE SECURITY+ DOMAIN 4.0 SECURITY 5

Rating
-
Sold
-
Pages
28
Grade
A+
Uploaded on
13-02-2025
Written in
2024/2025

CERTMASTER CE SECURITY+ DOMAIN 4.0 SECURITY 5

Institution
CERTMASTER CE SECURITY + DOMAIN
Course
CERTMASTER CE SECURITY + DOMAIN










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CERTMASTER CE SECURITY + DOMAIN
Course
CERTMASTER CE SECURITY + DOMAIN

Document information

Uploaded on
February 13, 2025
Number of pages
28
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

1. What is the primary goal of a Disaster Recovery (DR) plan in the
context of security operations?
A. To prevent security breaches from happening
B. To recover systems and data after an attack or disaster
C. To monitor ongoing security incidents in real time
D. To conduct regular vulnerability scans on critical systems
Answer: B) To recover systems and data after an attack or disaster
Rationale: A Disaster Recovery plan focuses on restoring systems and
data to normal operations after a disaster or attack, ensuring business
continuity.


2. What is the main objective of patch management in a security
operations program?
A. To reduce the likelihood of social engineering attacks
B. To close vulnerabilities in software and systems
C. To ensure data is encrypted during transmission
D. To control access to sensitive data
Answer: B) To close vulnerabilities in software and systems
Rationale: Patch management involves identifying, acquiring, and
installing updates (patches) to software and systems to close security
vulnerabilities that could be exploited by attackers.

,3. Which of the following is an example of a physical security control?
A. Antivirus software
B. Biometric access control systems
C. Firewalls
D. Data encryption
Answer: B) Biometric access control systems
Rationale: Physical security controls include measures to protect
physical access to assets, such as biometric access controls, locks, and
surveillance systems.


4. Which of the following best describes the concept of defense in
depth?
A. Using multiple layers of security controls to protect an asset
B. Encrypting data at rest to prevent unauthorized access
C. Monitoring the network for malicious traffic
D. Blocking all external network connections
Answer: A) Using multiple layers of security controls to protect an
asset
Rationale: Defense in depth involves applying multiple layers of
security controls to protect critical assets, ensuring that if one layer is
breached, others remain to provide protection.

, 5. What is the main function of a vulnerability scanner?
A. To automatically patch vulnerabilities in systems
B. To identify potential weaknesses in systems and applications
C. To monitor network traffic for malicious activity
D. To block unauthorized users from accessing resources
Answer: B) To identify potential weaknesses in systems and
applications
Rationale: Vulnerability scanners are used to identify potential
vulnerabilities in systems, software, and networks, allowing
organizations to address them before they can be exploited.


6. What is the function of a Web Application Firewall (WAF)?
A. To block unauthorized access to internal networks
B. To monitor and block malicious web traffic to web applications
C. To scan for malware in web applications
D. To prevent denial-of-service attacks
Answer: B) To monitor and block malicious web traffic to web
applications
Rationale: A WAF is designed to filter and monitor HTTP/HTTPS
traffic to and from a web application, protecting it from attacks such as
SQL injection, cross-site scripting (XSS), and others.
$8.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
douglasmugwe82
5.0
(1)

Get to know the seller

Seller avatar
douglasmugwe82 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
1 year
Number of followers
0
Documents
4239
Last sold
3 months ago
fully answered questions and answer

fully answered questions and answer

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions