1
CORRECT WELL DETAILED ANSWERS|LATEST
PASS
An organization wants to ensure that only authorized personnel can access sensitive data stored in a database. What security measure should be implemented for protecting data at rest? - ANSWER Access controls
A company wishes to secure communication between its two branch offices over the internet. What technology should be employed for protecting data in motion? - ANSWER Virtual Private Network (VPN)
A web application needs to identify and prevent SQL injection attacks. What security measure is most appropriate for protecting data in use? - ANSWER Application-level encryption
An organization wants to prevent unauthorized access to its internal network from external sources. What security measure should be implemented? - ANSWER Network Segmentation
A company aims to detect and respond to potential security incidents on its network. What technology is specifically designed for this purpose? - ANSWER Intrusion Detection System (IDS)
A security analyst is conducting a vulnerability assessment on a network. What tool is commonly used to identify open ports on a system? - ANSWER Nmap
- / 2
2
A company wants to ensure that employees' login credentials are securely transmitted over the internet. What technology should be used for this purpose? - ANSWER SSL/TLS encryption
An organization uses a security tool that captures and analyzes network traffic in real-time.What type of tool is being described? - ANSWER Packet Sniffer
A system administrator is implementing measures to prevent brute force attacks on user accounts. What security measure is most effective for this purpose? - ANSWER Account Lockouts
A company wants to allow employees to securely access internal resources from remote locations. What technology provides a secure method for this? - ANSWER Virtual Private Network (VPN)
An organization wishes to monitor and control the websites that employees can access.What technology is commonly used for this purpose? - ANSWER Proxy Servers
A security professional is conducting a penetration test on a web application to identify vulnerabilities. What tool is commonly used for this purpose? - ANSWER Burp Suite
An organization aims to protect sensitive data by replacing it with a random value. What technique is being described? - ANSWER Tokenization
A company is concerned about protecting data integrity during transmission. What technology should be used for this purpose? - ANSWER Hash Functions
An organization wants to monitor and log all incoming and outgoing network traffic for security analysis. What technology is suitable for this purpose? - ANSWER NIDS
- / 2