Data Privacy & Protection
Identity & Access Management
Network & Email Security
100

An organization is developing an app that collects user data. Which principle ensures user data is protected?

Collecting only the data necessary for the application's functionality.

100

What is the main purpose of de-provisioning user accounts?:DDDDDD

To remove access rights and resources when no longer required.

100

A company implements DKIM for email protection. What does DKIM primarily prevent?

Email spoofing my G

200

A company wants to obscure Social Security numbers in their database. What technique should they use?

Data masking. (I love u ur doing great nathan<3)

200

Which access control model ensures users only access what they’ve been explicitly granted?

RBAC (Role-Based Access Control)- think  of YOU control ME 

200

An IDS alert shows repeated failed login attempts from one IP. What’s this likely indicating?

A brute-force attack attempt.

300

A company wants to ensure only the intended recipient can read their emails, even if intercepted. What PKI feature makes this possible?

Private key.

300

An organization adds a new incident response team to manage breaches. What type of control is this?

Operational control.

300

A company encrypts both stored data and data in transit. What’s the purpose of this?

To protect data confidentiality.

400

A cloud service provider wants secure encryption and key management. What technology provides strong key storage?

HSM (Hardware Security Module)!!!!!

400

Before integrating new security controls, a company tests their performance and effectiveness. Which change management step is this?

Test resultssssssssss

400

Frequent changes in firewall rules might not indicate intrusion, but what type of issue could it signal?

Misconfiguration or lack of policy control.

500

To reduce data loss impact, which strategy best lowers the exposure factor?

Increasing the frequency of data backups.

500

A security analyst reviews IPS/IDS logs. Which finding best indicates a potential intrusion attempt?

:OOO not clickbait!!! Signature-based alerts on known malware traffic.

500

Which technology manages email integrity and uses DNS records to authenticate senders?

SPF/DKIM/DMARC.

M
e
n
u