Q91
Q91 A company detects a security breach but the attacker is still active on the network. What should be the immediate next step?
Erase all data
Perform a live capture of network activity
Ignore the issue
Update antivirus software
Q92
Q92 During a forensic investigation, you find encrypted files on a suspect’s device. What is the most appropriate next step?
Delete the files
Attempt to crack the encryption
Erase the hard drive
Ignore the files
Q93
Q93 An investigator finds that log files have been tampered with during a forensic investigation. What should be done next?
Erase the logs
Analyze alternative evidence
Update the software
Restart the system
Q94
Q94 What is the main purpose of data encryption?
To increase storage capacity
To secure data from unauthorized access
To improve network speed
To reduce file sizes
Q95
Q95 Which regulation governs data protection and privacy in the European Union?
GDPR
HIPAA
PCI-DSS
ISO 27001
Q96
Q96 What is the primary purpose of data masking in data privacy?
To enhance file security
To protect sensitive information in non-production environments
To compress large data sets
To improve application speed
Q97
Q97 Which of the following is considered a violation of data privacy?
Encrypting customer data
Sharing personal information without consent
Backing up sensitive data
Implementing access control
Q98
Q98 Which Python library is commonly used for implementing data encryption?
hashlib
numpy
requests
cryptography
Q99
Q99 Which SQL command is used to anonymize personal information in a database?
SELECT
UPDATE
DELETE
ANONYMIZE
Q100
Q100 In Java, how can you implement AES encryption to secure sensitive data?
By using javax.crypto
By using java.net
By using java.util.Scanner
By using java.sql
Q101
Q101 A user reports that their personal data is being shared without their consent. What is the most likely violation?
Data breach
Compliance issue
Misconfigured access controls
Privacy violation
Q102
Q102 A company’s data backup system is not encrypting the stored data. What is the immediate risk?
Increased data integrity
Increased data exposure
Faster access times
Reduced storage space
Q103
Q103 During an audit, it is discovered that an application is storing user passwords in plain text. What is the recommended solution?
Encrypt the passwords
Use stronger passwords
Delete the passwords
Use email-based login
Q104
Q104 What is the primary concern of cloud security?
Data availability
Cost optimization
Data confidentiality and integrity
Network speed
Q105
Q105 Which security model is most commonly used in cloud computing to restrict access to resources?
Role-based access control (RBAC)
Least privilege
Administrator access
Discretionary access control (DAC)
Q106
Q106 What is the most effective method to ensure data privacy in a cloud storage system?
Compression
Data encryption
Tokenization
Backup
Q107
Q107 Which cloud service model poses the greatest security challenge due to customer responsibility for data protection?
IaaS(Infrastructure as a Service)
PaaS (Platform as a Service)
SaaS (Software as a Service)
DaaS (Desktop as a Service)
Q108
Q108 Which of the following is a significant risk of using a public cloud service?
Faster performance
Vendor lock-in
Data breaches
Reduced flexibility
Q109
Q109 Which command-line tool can be used to encrypt data before uploading it to a cloud storage service in Linux?
ssh
gpg
chmod
scp
Q110
Q110 In AWS, how can you enforce encryption for data at rest in an S3 bucket?
By using HTTPS
By enabling Server-Side Encryption (SSE)
By disabling public access
By using MFA
Q111
Q111 Which API can be used in Google Cloud Platform (GCP) to control access to cloud resources?
Cloud Storage API
IAM API
Compute Engine API
BigQuery API
Q112
Q112 A company notices unauthorized access to its cloud resources from an unfamiliar IP address. What should be the immediate action?
Reboot the servers
Restrict access and investigate
Ignore the activity
Block all traffic
Q113
Q113 During a cloud security audit, it is discovered that sensitive data is being transmitted without encryption. What is the recommended action?
Ignore the issue
Encrypt the data in transit
Delete the sensitive data
Move to a private cloud
Q114
Q114 What is the biggest security challenge with IoT devices?
Limited bandwidth
Lack of encryption
Inconsistent software updates
Weak processing power
Q115
Q115 Which type of attack is most commonly associated with IoT devices?
Man-in-the-middle attack
Denial-of-service attack
Ransomware attack
Botnet attack
Q116
Q116 Why is device authentication critical in IoT security?
To reduce power consumption
To enhance processing speed
To ensure that only authorized devices can communicate
To decrease network traffic
Q117
Q117 What is the risk of hardcoded credentials in IoT devices?
They provide faster access
They can be easily compromised by attackers
They increase performance
They simplify updates
Q118
Q118 Which protocol is commonly used to secure communication between IoT devices?
HTTP
CoAP
MQTT
HTTPS
Q119
Q119 How can you secure firmware updates on IoT devices to prevent tampering?
By using unencrypted channels
By disabling updates
By using code signing
By using HTTP
Q120
Q120 In Python, which library can be used to implement encryption for securing data in an IoT device?
random
cryptography
math
socket