Question.41 A user receives an email that appears to be from their bank, requesting their login credentials. This is an example of what type of attack? (A) Spoofing (B) Phishing (C) DOS/DDOS (D) Virus |
41. Click here to View Answer
Correct Answer: (B) Phishing
Question.42 Which cryptographic attack targets the process of intercepting and altering communication between two parties? (A) Man-in-the-middle (MITM) attack (B) Brute-force attack (C) Dictionary attack (D) Rainbow table attack |
42. Click here to View Answer
Correct Answer: (A) Man-in-the-middle (MITM) attack
Question.43 Which type of malware encrypts a user’s files and demands payment in exchange for the decryption key? (A) Ransomware (B) Worm (C) Trojan (D) Virus |
43. Click here to View Answer
Correct Answer: (A) Ransomware
Question.44 What security control is used to protect data in transit between cloud services and users’ devices? (A) Data encryption at rest (B) Network intrusion detection systems (NIDS) (C) Transport Layer Security (TLS) (D) Role-based access control (RBAC) |
44. Click here to View Answer
Correct Answer: (C) Transport Layer Security (TLS)
Question.45 Which component of a Business Continuity Plan (BCP) identifies critical business functions and the resources required to support them? (A) Plan development and testing (B) Risk assessment (C) Business impact analysis (BIA) (D) Plan implementation |
45. Click here to View Answer
Correct Answer: (C) Business impact analysis (BIA)