반응형

fcf q&a 5

[FCF] Cybersecurity 2.0 - Lesson 08 : Endpoint Hardening Techniques (Quesion&Answer)

Q. Which hardening endpoint category does the principle of least privilege belong to? Select one: - Endpoint maintenance - Administrative controls- Endpoint monitoring - Local endpoint protection Q. Which technology has caused the number of endpoints to multiply exponentially? Select one: - Artificial intelligence (AI) - Virtualization - Internet of things (IoT)- Cloud services Q. Which techniqu..

[FCF] Cybersecurity 2.0 - Lesson 07 : Wi-Fi (Quesion&Answer)

Q. Which two features of Wi-Fi Protected Access 3 (WPA3) strengthened security? (Choose two.) Select one or more: - The handshake for establishing connections became more secure.- Complex passphrases were enforced. - The encryption key size was lengthened. - Digital signatures were introduced to help identify valid access points (APs). Q.What is Wi-Fi? Select one: - Technology for radio wireless..

[FCF] Cybersecurity 2.0 - Lesson 04 : WAF (Quesion&Answer)

Q. Which event was the motivation for web application firewall (WAFs)? Select one: - ARPANET was brought online - The development of the hypertext transfer protocol - The first wide area network (WAN) - The debut of the World Wide Web Q. Which action can a modern WAF do? Select one: - Survey the network and calculate a value to represent the security posture - Connect all tools in the security s..

[FCF] Cybersecurity 2.0 - Lesson 03 : Sandbox (Quesion&Answer)

Q. What was a benefit of second generation sandbox technology? Select one: - Scanning of encrypted data streams - Automation and artificial intelligence (AI) - Faster network speeds - Timely sharing of threat intelligence Q. Which feature in early networks made aggregating threat intelligence difficult? Select one: - Hybrid cloud environments - Segmentation - Point solutions - Virtualization Q. ..

[FCF] Cybersecurity 2.0 - Lesson 02 : Network Access Control (Quesion&Answer)

Q. What action do you typically need to do to join a public network, such as one in a coffee shop? Select one: - Provide biometric information - Agree to the legal terms for using the network - Register your handheld device - Submit your personal digital certificate Q. How does NAC effectively segment a network? Select one: - Using IP addresses - Routers - Using user roles - Utilizing device pro..

반응형