Network Security
Application Security
Information Security
Cloud Security
Zero Trust
100

What is the purpose of a firewall in network security?

A firewall acts as a barrier to control incoming and outgoing network traffic based on predetermined security rules.

100

What is secure coding?

Secure coding refers to practices that help programmers write software that is free from vulnerabilities.

100

What does physical security protect?

It protects physical assets like computers and servers from damage or unauthorized access.

100

What is a common risk of storing data in the cloud?

Unauthorized access to sensitive data

100

What does the Zero Trust model assume about users and devices?

That no user or device can be trusted by default.

200

Name a common tool used to detect unauthorized access to a network.

Intrusion Detection System (IDS)

200

What is the purpose of vulnerability testing in applications?

To identify and fix security weaknesses in software before they can be exploited.

200

What is logical security?

Logical security protects data and information through software and systems, like passwords and encryption.

200

What does data encryption in the cloud do?

It protects data by transforming it into an unreadable format without the correct key.

200

What is required in a Zero Trust approach before granting access?

Strict verification and identity checks.

300

What does network access control help to manage?

It helps to manage who can access a network and what resources they can use.

300

Why is it important to update applications regularly?

Regular updates fix security vulnerabilities and bugs that could be exploited by attackers.

300

What is encryption?

Encryption is a method of converting data into a coded format to prevent unauthorized access.

300

Name a method to control access to cloud resources.

Access controls or identity management systems.

300

Why is continuous monitoring important in Zero Trust?

It helps detect suspicious activity and potential breaches.

400

What type of network is typically more secure, wired or wireless?

Wired networks are typically more secure due to physical connections.

400

What is a common type of attack targeting applications?

SQL Injection

400

Why is data loss prevention important?

It helps prevent sensitive data from being lost, stolen, or misused.

400

What is a cloud access security broker (CASB)?

A service that acts as a gatekeeper to ensure security policies are enforced across cloud services.

400

What is one principle of Zero Trust?

Least privilege access, where users only have access to what they need.

500

Explain what a Virtual Private Network (VPN) does.

A VPN creates a secure connection over the internet, allowing users to send and receive data as if they were directly connected to a private network.

500

What does the acronym OWASP stand for?

Open Web Application Security Project

500

Name one way to protect sensitive information.

Use strong passwords and two-factor authentication.

500

What is the purpose of cloud security assessments?

To evaluate the security of cloud services and identify vulnerabilities.

500

How can organizations implement a Zero Trust architecture?

By using multi-factor authentication and micro-segmentation.