Enter Your Name Below
1/12
What is the highest GDPR fine up to date?
20 M€
10 M€
746 M€
1.2 B€
2/12
Which forensics artifact (on Windows OS), would you choose, to discover how many bytes of data was sent out during the infection?
System Resource Utilization Monitor (SRUM).
Prefetch files.
Browser history.
Ntuser.dat hive.
3/12
Which of these technologies is NOT used for cloud security?
Data encryption at rest
Virtual Private Networks (VPN)
Blockchain
Identity-based access controls
4/12
Which of them is the most specific set of instructions on Policy Pyramid:
Policy
Standard
Guideline
Baseline
5/12
Which item below is a federated identity standard?
802.11i
Kerberos
Lightweight Directory Access Protocol (LDAP)
Security Assertion Markup Language (SAML)
6/12
In what type of attack does a hacker use multiple systems to conduct a coordinated attack on a single system or network?
DDoS Attack
Brute-force attack
XSS attack
Ransomware attack
7/12
Which of below is not appropriate answer how we can manage risk event:
Risk Transfer
Risk Acceptance
Risk Cascading
Risk Avoidance
8/12
How do you call a technique, in which you run a process in the suspended state, replace the code in memory, and resume the execution?
Timestomping
DLL injection.
Process hollowing.
Binary packing.
9/12
What is the name of the attack in which an attacker inserts unauthorized SQL code into a query, manipulating the database?
Cross-Site Scripting (XSS)
SQL Injection
Rootkit
DDoS
10/12
What is the biggest danger of uploading malware targeting your organization to publicly available sandboxes?
The malicious code can destroy the sandbox.
Threat actor may discover that you have uploaded his code to the sandbox environment.
The malicious code can find out it is being analyzed.
The sample was purely developed to target your organization, and contains active credentials for your admin accounts, which were compromised few weeks ago. Such upload can exposed them to a wider group people.
11/12
Breaking which part of Cyber Kill Chain can prevent malicious actor from completing their objectives?
Reconnaissance
Exploitation
Any part
Command & Control
12/12
When is session hijacking carried out?
After three-step handshake
Before three-step handshake
During three-step handshake
None of the above
Wait...
Previous question
Next question
Finish