Question 1
Your company handles sensitive financial data, and an employee has accidentally left a laptop with open files in a public area. Someone notices the data and takes a screenshot of it.
What would have prevented this breach of confidentiality?
Using strong encryption for sensitive files
Setting strict internal policies for file storage
Using a VPN for accessing the data remotely
Both a and b
Question 2
A banking system experiences an issue where the transaction records in the database are modified by an attacker without authorization. The attacker manipulates account balances and withdrawal amounts.
Which measure would best maintain data integrity and prevent such unauthorized modifications?
Using access control lists (ACLs)
Implementing digital signatures on transaction data
Regularly backing up transaction logs
Encrypting database storage
Question 3
A popular e-commerce website faces a DDoS (Distributed Denial of Service) attack. The site becomes unresponsive, and customers cannot access their shopping carts or make purchases.
Which action would improve the availability of the website and mitigate future DDoS attacks?
Implementing a load balancer and cloud-based DDoS protection
Installing more firewalls
Reducing the number of customer accounts
Increasing the website's bandwidth
Question 4
A company sends sensitive financial data over email without encryption. An attacker intercepts the email and gains access to sensitive client information.
Which of the following would best protect the confidentiality of sensitive data in emails?
Encrypting the email content using PGP (Pretty Good Privacy)
Using a secure email provider like ProtonMail
Implementing 2-factor authentication (2FA) for email accounts
Both a and b
Question 5
Your company’s server is configured to automatically install software updates. However, an attacker compromises the update server and pushes out a malicious software update.
How could you maintain the integrity of the software updates and prevent such attacks?
Using digital signatures for software updates
Enabling real-time monitoring of software installation
Regularly patching the update server
All of the above
Question 6
A critical system goes down after a server crash, and the business is unable to access important customer data for several hours.
Which of the following measures ensures availability and reduces downtime in case of such system
Implementing regular backups and disaster recovery plans
Increasing server storage capacity
Encrypting backup files
Limiting user access to the system
There are 6 questions to complete.