What is the purpose of a firewall in network security?
A firewall acts as a barrier to control incoming and outgoing network traffic based on predetermined security rules.
What is secure coding?
Secure coding refers to practices that help programmers write software that is free from vulnerabilities.
What does physical security protect?
It protects physical assets like computers and servers from damage or unauthorized access.
What is a common risk of storing data in the cloud?
Unauthorized access to sensitive data
What does the Zero Trust model assume about users and devices?
That no user or device can be trusted by default.
Name a common tool used to detect unauthorized access to a network.
Intrusion Detection System (IDS)
What is the purpose of vulnerability testing in applications?
To identify and fix security weaknesses in software before they can be exploited.
What is logical security?
Logical security protects data and information through software and systems, like passwords and encryption.
What does data encryption in the cloud do?
It protects data by transforming it into an unreadable format without the correct key.
What is required in a Zero Trust approach before granting access?
Strict verification and identity checks.
What does network access control help to manage?
It helps to manage who can access a network and what resources they can use.
Why is it important to update applications regularly?
Regular updates fix security vulnerabilities and bugs that could be exploited by attackers.
What is encryption?
Encryption is a method of converting data into a coded format to prevent unauthorized access.
Name a method to control access to cloud resources.
Access controls or identity management systems.
Why is continuous monitoring important in Zero Trust?
It helps detect suspicious activity and potential breaches.
What type of network is typically more secure, wired or wireless?
Wired networks are typically more secure due to physical connections.
What is a common type of attack targeting applications?
SQL Injection
Why is data loss prevention important?
It helps prevent sensitive data from being lost, stolen, or misused.
What is a cloud access security broker (CASB)?
A service that acts as a gatekeeper to ensure security policies are enforced across cloud services.
What is one principle of Zero Trust?
Least privilege access, where users only have access to what they need.
Explain what a Virtual Private Network (VPN) does.
A VPN creates a secure connection over the internet, allowing users to send and receive data as if they were directly connected to a private network.
What does the acronym OWASP stand for?
Open Web Application Security Project
Name one way to protect sensitive information.
Use strong passwords and two-factor authentication.
What is the purpose of cloud security assessments?
To evaluate the security of cloud services and identify vulnerabilities.
How can organizations implement a Zero Trust architecture?
By using multi-factor authentication and micro-segmentation.