| Question.41 A user receives an email that appears to be from their bank, requesting their login credentials. This is an example of what type of attack? (A) Spoofing (B) Phishing (C) DOS/DDOS (D) Virus |
41. Click here to View Answer
Correct Answer: (B) Phishing
| Question.42 Which cryptographic attack targets the process of intercepting and altering communication between two parties? (A) Man-in-the-middle (MITM) attack (B) Brute-force attack (C) Dictionary attack (D) Rainbow table attack |
42. Click here to View Answer
Correct Answer: (A) Man-in-the-middle (MITM) attack
| Question.43 Which type of malware encrypts a user’s files and demands payment in exchange for the decryption key? (A) Ransomware (B) Worm (C) Trojan (D) Virus |
43. Click here to View Answer
Correct Answer: (A) Ransomware
| Question.44 What security control is used to protect data in transit between cloud services and users’ devices? (A) Data encryption at rest (B) Network intrusion detection systems (NIDS) (C) Transport Layer Security (TLS) (D) Role-based access control (RBAC) |
44. Click here to View Answer
Correct Answer: (C) Transport Layer Security (TLS)
| Question.45 Which component of a Business Continuity Plan (BCP) identifies critical business functions and the resources required to support them? (A) Plan development and testing (B) Risk assessment (C) Business impact analysis (BIA) (D) Plan implementation |
45. Click here to View Answer
Correct Answer: (C) Business impact analysis (BIA)