100% Correct
What is the difference between symmetric and asymmetric encryption?
✔✔Symmetric encryption uses the same key for encryption and decryption, while asymmetric
encryption uses a pair of public and private keys.
What is the role of a cybersecurity policy?
✔✔To define guidelines and rules for protecting an organization’s assets and data.
What is a zero-day vulnerability?
✔✔A vulnerability that is unknown to the software vendor and is exploited before a fix is
released.
How does endpoint detection and response (EDR) enhance security?
✔✔By monitoring and analyzing activity on endpoints to detect and respond to threats in real
time.
What is the purpose of a penetration test?
1
,✔✔To simulate a real attack on systems to identify vulnerabilities and improve security
measures.
What is the function of data loss prevention (DLP) tools?
✔✔To monitor, detect, and prevent unauthorized access or transfer of sensitive data.
How does a virtual private network (VPN) protect users?
✔✔By encrypting data and creating a secure connection over the internet.
What is the purpose of role-based access control (RBAC)?
✔✔To assign access permissions based on an individual’s role within an organization.
What is the importance of regular cybersecurity training for employees?
✔✔To raise awareness and reduce the likelihood of human errors leading to security breaches.
What is the purpose of a cybersecurity framework?
✔✔To provide a structured approach to managing cybersecurity risks and ensuring compliance
with standards.
2
,What is the first step in the incident response process?
✔✔Identifying and detecting the security incident.
How does encryption protect sensitive data?
✔✔It converts data into an unreadable format that can only be decrypted with the correct key.
What is the primary goal of access control in cybersecurity?
✔✔To restrict access to systems and data based on user roles and permissions.
Why is a vulnerability assessment important for an organization?
✔✔It helps identify weaknesses in the system that attackers could exploit.
What is the principle of least privilege?
✔✔Ensuring users have only the permissions necessary to perform their job functions.
What is a firewall used for in a network?
✔✔To monitor and control incoming and outgoing network traffic based on security rules.
3
, What is the difference between authentication and authorization?
✔✔Authentication verifies a user’s identity, while authorization determines their access level.
What is the main purpose of implementing multi-factor authentication (MFA)?
✔✔To add an extra layer of security by requiring multiple verification methods.
What is a phishing attack?
✔✔A cyberattack where attackers trick users into revealing sensitive information through
deceptive emails or messages.
How does a security information and event management (SIEM) system help organizations?
✔✔By collecting and analyzing security data from multiple sources to detect and respond to
threats.
What is the purpose of a disaster recovery plan?
✔✔To ensure business continuity by outlining steps to recover IT systems after a disruption.
4