Questions:
- Which of these keys can be used to sign, and verify the authenticity of a GitHub Repository ?
A. SSH Keys.
B. GPG Keys.
C. PGP Keys.
D. A & B.
E. None of the Above.
F. All of the Above.
Answer: (Option B).
- The process by which an organization shift its data and services it provides from their physical facility to a cloud service is known as ?
A. Cloud Computation.
B. Cloud Backups.
C. Cloud Installations.
D. Cloud Migration.
E. None of the Above.
F. All of the Above.
Answer: (Option D).
- Which of the following is the best protection of a web application used by a cybersecurity professional ?
A. Firewall/Router & Backups.
B. Perimeter defense, Firewall/Router & Backups.
C. Perimeter, your physical computer, endpoints, and backups.
D. Firewall/Router, Backups, Security Software, Your Physical computer.
E. None of the Above.
F. All of the Above.
Answer: (Option D).
- Which of these practice is best suitable in safeguarding your smart devices?
A. Ensure all IT security risk of your IT devices are fixable.
B. If possible, ensure that your smart devices and computers are on a different network.
C. Track a list of some of the smart devices on your network.
D. Keep your device connected when not in use, when on a home network.
E. None of the Above.
F. All of the Above.
Answer: (Option B).
Episode 6-Video: A Detailed description of the various options given in the Q & A episode…
- Which of the following best describes a pharming attack?
A. Pharming attack is similar to a phishing attack.
B. It exploits various technical vulnerabilities in internet-based routing.
C. Unlike phishing attacks, pharming attacks involves impersonating trustworthy party.
D. A & B.
E. None of the Above.
F. All of the Above.
Answer: (Option D).
- Which of the following is/are the best password policies?
A. Use easily guessable password by you or anyone else.
B. Ensure the use of complicated passwords.
C. Change your password immediately after a breach.
D. A & B.
E. None of the Above.
F. All of the Above.
Answer: (Option C).
- Which of the following Authentication systems, uses the unique part of a physical human as a form of identifier?
A. Hardware Token Authentication.
B. App based one-time password.
C. USB Authentication.
D. Biometrics Authentication.
E. None of the Above.
F. All of the Above.
Answer: (Option D).
- What type of Firewall sits between the protected network and the network being protected from?
A. Packet Filters Firewall.
B. Stateful Inspection Firewall.
C. Application Proxy Firewall.
D. A,B & C.
E. None of the Above.
F. All of the Above.
Answer: (Option C).
- What is the UDP port number for IKE (Internet Key Exchange)?
A. 514.
B. 123.
C. 1719.
D. A & B.
E. None of the Above.
F. All of the Above.
Answer: (Option E).
- Which of the following best describes a Hybrid Cloud?
A. A Cloud that can morph into various cloud.
B. A Hybrid Cloud is provided by both the organization, and the cloud vendor.
C. A Hybrid cloud is a combination of both on premise cloud, and cloud services.
D. B & C.
E. None of the Above.
F. All of the Above.
Answer: (Option E).
Put your comments below in the comment section on your thoughts about this.