Practice Free 100-160 Exam Online Questions
Which feature allows endpoints to communicate directly with each other, bypassing the network?
- A . Firewall
- B . IPS
- C . VPN
- D . Peer-to-Peer
D
Explanation:
Option 1: Incorrect. A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
Option 2: Incorrect. An IPS (Intrusion Prevention System) is a network security device that monitors network traffic for malicious activity and takes immediate action to prevent attacks.
Option 3: Incorrect. A VPN (Virtual Private Network) is a secure connection between two or more endpoints over a public network, providing encryption and privacy for data communication.
Option 4: Correct. Peer-to-peer (P2P) is a decentralized communication model where endpoints can directly communicate with each other without the need for a central server or network infrastructure.
Which of the following best describes the concept of automation in cybersecurity testing?
- A . Implementing security controls to prevent attacks
- B . Using software and tools to automatically conduct security tests
- C . Performing physical tests on network infrastructure
- D . Conducting manual security tests
B
Explanation:
Automation in cybersecurity testing involves using software and tools to automatically conduct security tests. This approach helps to increase efficiency and accuracy by automating repetitive tasks, such as vulnerability scanning, penetration testing, and log analysis. It allows for the identification of security issues and vulnerabilities in a timely manner.
Which compliance framework is specifically related to protecting the personal data and privacy of European Union (EU) citizens?
- A . HIPAA
- B . GDPR
- C . PCI-DSS
- D . FERPA
B
Explanation:
The General Data Protection Regulation (GDPR) is a compliance framework implemented by the European Union to protect the personal data and privacy of EU citizens. It focuses on the collection, processing, and storage of personal data, and it applies to any organization that handles EU citizens’ data, regardless of its location.
Which of the following best describes an Advanced Persistent Threat (APT)?
- A . An unintentional and harmless interaction with a computer system
- B . A security incident caused by human error or negligence
- C . A targeted cyber attack that aims to gain unauthorized access to sensitive information
- D . A type of malware designed to disrupt computer networks
C
Explanation:
An APT is a sophisticated and ongoing cyber attack by threat actors with the objective of gaining unauthorized access to sensitive information or networks. Unlike traditional attacks, APTs are stealthy and persistent, often targeting specific organizations or individuals for an extended period of time.
Which compliance framework is primarily concerned with securing payment card data and ensuring it is protected against unauthorized access?
- A . HIPAA
- B . GDPR
- C . PCI-DSS
- D . FERPA
C
Explanation:
The Payment Card Industry Data Security Standard (PCI-DSS) is a compliance framework developed by the major credit card companies to safeguard payment card data and prevent fraud. It provides guidelines, requirements, and best practices for organizations that handle cardholder information,
ensuring that it is stored, processed, and transmitted securely.
Which of the following refers to a list of all hardware components installed on an endpoint system?
- A . Configuration inventory
- B . Hardware inventory
- C . Software inventory
- D . Firmware inventory
B
Explanation:
Hardware inventory refers to a comprehensive list of all hardware components installed on an endpoint system. This includes information about the CPU, memory, storage devices, network adapters, and any other hardware components.
Which of the following is an example of a strong password?
- A . "abcdabcd"
- B . "Password123"
- C . "StR0ngP@$$w0rd!"
- D . "123456"
C
Explanation:
A strong password is one that is complex, long, and difficult to guess. It should contain a combination of uppercase and lowercase letters, numbers, and special characters. In this case, "StR0ngP@$$w0rd!" meets these criteria, making it a strong password. The other options are weak passwords as they are easily guessable, commonly used, or lack complexity.
What is the primary reason for implementing multi-factor authentication in a cloud environment?
- A . To provide an additional layer of security
- B . To simplify the authentication process
- C . To reduce costs
- D . To improve performance
A
Explanation:
Option 1: Correct. Implementing multi-factor authentication provides an additional layer of security by requiring users to provide multiple forms of authentication to access cloud resources.
Option 2: Incorrect. The primary reason for implementing multi-factor authentication is to provide an additional layer of security, not to simplify the authentication process.
Option 3: Incorrect. The primary reason for implementing multi-factor authentication is to provide an additional layer of security, not to reduce costs.
Option 4: Incorrect. The primary reason for implementing multi-factor authentication is to provide an additional layer of security, not to improve performance.
Which of the following is a key element of an incident response procedure?
- A . Performing vulnerability assessments
- B . Conducting employee security awareness training
- C . Regularly updating software patches
- D . Classifying incidents based on severity
D
Explanation:
Incident response procedures include classifying incidents based on their severity. Incident severity classification helps prioritize incident response actions based on the potential impact and risk involved. By categorizing incidents, appropriate resources and response efforts can be allocated to mitigate and resolve them effectively.
Which of the following operating systems includes a built-in antivirus software called Windows Defender?
- A . Windows
- B . macOS
- C . Linux
- D . Windows and macOS
A
Explanation:
Windows operating system includes a built-in antivirus software called Windows Defender. It provides real-time protection against various types of malware, including viruses, spyware, and ransomware. Windows Defender is automatically enabled and updated on Windows computers to help keep the system secure. Note: macOS and Linux operating systems have their own security features, but they do not include Windows Defender. macOS has a built-in security tool called XProtect, which provides some protection against malware, and Linux offers various security features such as SELinux (Security-Enhanced Linux) and AppArmor.