100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CERTMASTER CE SECURITY+ DOMAIN 4.0 SECURITY 7

Beoordeling
-
Verkocht
-
Pagina's
28
Cijfer
A+
Geüpload op
13-02-2025
Geschreven in
2024/2025

CERTMASTER CE SECURITY+ DOMAIN 4.0 SECURITY 7

Instelling
CERTMASTER CE SECURITY + DOMAIN
Vak
CERTMASTER CE SECURITY + DOMAIN










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CERTMASTER CE SECURITY + DOMAIN
Vak
CERTMASTER CE SECURITY + DOMAIN

Documentinformatie

Geüpload op
13 februari 2025
Aantal pagina's
28
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

1. Which of the following is a key aspect of security awareness training
for employees?
A. Ensuring all employees are granted administrative access
B. Teaching employees how to identify phishing emails
C. Disabling all antivirus software on user systems
D. Allowing unrestricted access to external websites
Answer: B) Teaching employees how to identify phishing emails
Rationale: Security awareness training educates employees on how to
recognize common threats, such as phishing, and encourages safe
practices to reduce the risk of a security breach.


2. Which of the following tools is commonly used for continuous
monitoring of security events and logs?
A. Antivirus software
B. Security Information and Event Management (SIEM)
C. Network Intrusion Prevention System (IPS)
D. Web Application Firewall (WAF)
Answer: B) Security Information and Event Management (SIEM)
Rationale: SIEM systems are used for continuous monitoring and
analysis of security events, providing real-time alerts and insights to
help identify potential security threats.

,3. What is the primary objective of an Incident Response (IR) team
during a security incident?
A. To identify and stop the attack as quickly as possible
B. To collect evidence for legal prosecution
C. To ensure the business remains operational at all costs
D. To report the incident to regulatory authorities immediately
Answer: A) To identify and stop the attack as quickly as possible
Rationale: The primary goal of the IR team during a security incident
is to quickly identify the attack and stop it to prevent further damage,
followed by containment and remediation actions.


4. Which of the following is a key feature of multi-factor authentication
(MFA)?
A. Password complexity requirements
B. Verification through two or more separate authentication factors
C. Biometric authentication only
D. Single sign-on across multiple systems
Answer: B) Verification through two or more separate authentication
factors
Rationale: MFA enhances security by requiring two or more forms of
authentication, such as something you know (password), something you
have (smartphone), or something you are (fingerprint).

, 5. Which type of security testing would best help identify weaknesses
in a web application?
A. Penetration testing
B. Compliance auditing
C. Social engineering
D. Physical security assessments
Answer: A) Penetration testing
Rationale: Penetration testing simulates attacks on a system, including
web applications, to identify and address vulnerabilities that could be
exploited by attackers.


6. In security operations, what is the primary function of a firewall?
A. To provide secure access to applications
B. To block unauthorized access to or from a network
C. To monitor network traffic for malware
D. To encrypt data in transit
Answer: B) To block unauthorized access to or from a network
Rationale: A firewall is a network security device designed to monitor
and control incoming and outgoing network traffic based on
predetermined security rules, thus blocking unauthorized access.
€7,51
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
douglasmugwe82
5,0
(1)

Maak kennis met de verkoper

Seller avatar
douglasmugwe82 Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2
Lid sinds
1 jaar
Aantal volgers
0
Documenten
4239
Laatst verkocht
3 maanden geleden
fully answered questions and answer

fully answered questions and answer

5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen