100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CERTMASTER CE SECURITY+ DOMAIN 4.0 SECURITY 1

Rating
-
Sold
-
Pages
28
Grade
A+
Uploaded on
13-02-2025
Written in
2024/2025

CERTMASTER CE SECURITY+ DOMAIN 4.0 SECURITY 1

Institution
CERTMASTER CE SECURITY + DOMAIN
Course
CERTMASTER CE SECURITY + DOMAIN










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CERTMASTER CE SECURITY + DOMAIN
Course
CERTMASTER CE SECURITY + DOMAIN

Document information

Uploaded on
February 13, 2025
Number of pages
28
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

1. Which of the following is a common method of encrypting data in
transit?
A. RSA encryption
B. AES encryption
C. TLS (Transport Layer Security)
D. SHA-256 hashing
Answer: C) TLS (Transport Layer Security)
Rationale: TLS is widely used for encrypting data in transit, ensuring
secure communication between systems, such as between a web server
and a browser.


2. What does 'least privilege' mean in the context of security
operations?
A. Only allowing access to the most critical data and systems
B. Restricting users’ access to only the resources necessary for their
tasks
C. Allowing users to access all resources to improve efficiency
D. Granting full administrative rights to all employees
Answer: B) Restricting users’ access to only the resources necessary for
their tasks

,Rationale: The principle of least privilege ensures that users are
granted the minimum level of access necessary to perform their job
functions, reducing the risk of accidental or malicious misuse of
resources.


3. What is the primary goal of a Disaster Recovery (DR) plan in the
context of security operations?
A. To prevent security breaches from happening
B. To recover systems and data after an attack or disaster
C. To monitor ongoing security incidents in real time
D. To conduct regular vulnerability scans on critical systems
Answer: B) To recover systems and data after an attack or disaster
Rationale: A Disaster Recovery plan focuses on restoring systems and
data to normal operations after a disaster or attack, ensuring business
continuity.


4. Which of the following is most likely to be a key performance
indicator (KPI) in a security operations center?
A. Number of malware infections detected
B. Time taken to detect and respond to security incidents
C. Total amount of system uptime
D. Percentage of budget spent on security tools
Answer: B) Time taken to detect and respond to security incidents

, Rationale: KPIs in a SOC often focus on response times and the
effectiveness of incident handling, such as how quickly security
incidents are detected and resolved.


5. What is the purpose of network traffic analysis in security
operations?
A. To identify and block malicious activity on the network
B. To encrypt all data in transit across the network
C. To ensure compliance with network security policies
D. To identify potential vulnerabilities in network devices
Answer: A) To identify and block malicious activity on the network
Rationale: Network traffic analysis helps identify suspicious or
malicious activity in network communications, enabling security teams
to block or mitigate potential threats.


6. In which phase of the incident response lifecycle is evidence collected
and preserved?
A. Detection and Analysis
B. Containment, Eradication, and Recovery
C. Post-Incident Activity
D. Identification
Answer: A) Detection and Analysis
$8.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
douglasmugwe82
5.0
(1)

Get to know the seller

Seller avatar
douglasmugwe82 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
1 year
Number of followers
0
Documents
4239
Last sold
3 months ago
fully answered questions and answer

fully answered questions and answer

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions