Security Exam Simulation + Verified Answers
1. What is the main purpose of a data breach response plan?
To prevent data breaches
To conduct regular security audits
To monitor network traffic
To outline steps to take in the event of a data breach
2. What is the purpose of a Honey Pot in cybersecurity?
Preventing malware infections on computers
Attracting bees to secure sensitive data
Detecting and blocking phishing emails
Luring hackers into a controlled environment to monitor their
activities
3. If an organization experiences a data breach, which of the following
actions should be prioritized according to the data breach response
plan?
Implementing the predefined steps to contain and assess the
breach
Ignoring the breach if no sensitive data is reported
Immediately notifying the media about the breach
Conducting a complete overhaul of the IT infrastructure
4. What is a common risk associated with using outdated software in an
organization?
Data encryption
, Vulnerability to known exploits
User access control
Network segmentation
5. What is the first step you should take when you suspect a user's account
has been compromised?
Ignore it
Lock the account
Notify the user
Investigate the activity to assess the risk
6. Jim wants to place a device in the network demilitarized zone that may
be broken into by an attacker so that he can evaluate the strategies that
hackers are using on his systems. Which of the following best describes
what he would use?
Honeybucket
Spoofing system
Decoy system
Honeypot
7. Why is it important to implement a mitigation strategy immediately upon
identifying a critical vulnerability?
Implementing a mitigation strategy immediately helps to
reduce the risk of exploitation and protects sensitive data.
It ensures that all users are informed about the vulnerability.
It allows time for further analysis before taking action.
It provides an opportunity to document the vulnerability
thoroughly.