{"id":93079,"date":"2024-11-15T03:14:10","date_gmt":"2024-11-15T03:14:10","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=93079"},"modified":"2024-11-15T03:14:10","modified_gmt":"2024-11-15T03:14:10","slug":"100-160-exam-dumps-v8-02-achieve-impressive-results-in-the-actual-ccst-cybersecurity-exam","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/100-160-exam-dumps-v8-02-achieve-impressive-results-in-the-actual-ccst-cybersecurity-exam.html","title":{"rendered":"100-160 Exam Dumps (V8.02) &#8211; Achieve Impressive Results in the Actual CCST Cybersecurity Exam"},"content":{"rendered":"<p>The Cisco Certified Support Technician (CCST) Cybersecurity is one of the Cisco CCST certification exams, which validates your skills and knowledge of entry-level cybersecurity concepts and topics, including security principles, network security and endpoint security concepts, vulnerability assessment and risk management, and incident handling. It is a first step toward <a href=\"https:\/\/www.dumpsbase.com\/200-201.html\"><em><strong>CyberOps Associate<\/strong><\/em><\/a> certification. To earn the Cisco CCST Cybersecurity certification, you must take and pass the 100-160 exam. Focus on DumpsBase, we have the 100-160 exam dumps (V8.02) to ensure your success. The latest 100-160 exam dumps (V8.02) are the cornerstone of your success, paving the way for smooth passage through your Cisco Certified Support Technician (CCST) Cybersecurity exam. Complying with our 100-160 practice exam questions and answers, you can proficiently organize for the 100-160 exam within a reduced period, ensuring 100% success.<\/p>\n<h2>Check Cisco Certified Support Technician (CCST) Cybersecurity <em><span style=\"background-color: #00ffff;\">100-160 Free Dumps<\/span><\/em> First<\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam9238\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-9238\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-9238\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-366315'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>What is a common security threat in which an attacker attempts to overwhelm a targeted system by flooding it with Internet traffic?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='366315' \/><input type='hidden' id='answerType366315' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366315[]' id='answer-id-1427343' class='answer   answerof-366315 ' value='1427343'   \/><label for='answer-id-1427343' id='answer-label-1427343' class=' answer'><span>Ransomware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366315[]' id='answer-id-1427344' class='answer   answerof-366315 ' value='1427344'   \/><label for='answer-id-1427344' id='answer-label-1427344' class=' answer'><span>Distributed Denial of Service (DDoS) attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366315[]' id='answer-id-1427345' class='answer   answerof-366315 ' value='1427345'   \/><label for='answer-id-1427345' id='answer-label-1427345' class=' answer'><span>Phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366315[]' id='answer-id-1427346' class='answer   answerof-366315 ' value='1427346'   \/><label for='answer-id-1427346' id='answer-label-1427346' class=' answer'><span>SQL injection<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-366316'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>Which of the following statements about multi-factor authentication (MFA) is correct?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='366316' \/><input type='hidden' id='answerType366316' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366316[]' id='answer-id-1427347' class='answer   answerof-366316 ' value='1427347'   \/><label for='answer-id-1427347' id='answer-label-1427347' class=' answer'><span>MFA is a security measure that requires users to provide two or more forms of identification to gain access to a system or application.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366316[]' id='answer-id-1427348' class='answer   answerof-366316 ' value='1427348'   \/><label for='answer-id-1427348' id='answer-label-1427348' class=' answer'><span>MFA is a security measure that requires users to provide only one form of identification to gain access to a system or application<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366316[]' id='answer-id-1427349' class='answer   answerof-366316 ' value='1427349'   \/><label for='answer-id-1427349' id='answer-label-1427349' class=' answer'><span>MFA is a security measure that is no longer recommended due to its complexity and potential for user errors.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366316[]' id='answer-id-1427350' class='answer   answerof-366316 ' value='1427350'   \/><label for='answer-id-1427350' id='answer-label-1427350' class=' answer'><span>MFA is a security measure that only applies to physical access control systems.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-366317'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>Which of the following services or protocols can be used to ensure the security and compliance of an organization's network?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='366317' \/><input type='hidden' id='answerType366317' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366317[]' id='answer-id-1427351' class='answer   answerof-366317 ' value='1427351'   \/><label for='answer-id-1427351' id='answer-label-1427351' class=' answer'><span>NTP (Network Time Protocol)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366317[]' id='answer-id-1427352' class='answer   answerof-366317 ' value='1427352'   \/><label for='answer-id-1427352' id='answer-label-1427352' class=' answer'><span>SNMP (Simple Network Management Protocol)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366317[]' id='answer-id-1427353' class='answer   answerof-366317 ' value='1427353'   \/><label for='answer-id-1427353' id='answer-label-1427353' class=' answer'><span>DHCP (Dynamic Host Configuration Protocol)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366317[]' id='answer-id-1427354' class='answer   answerof-366317 ' value='1427354'   \/><label for='answer-id-1427354' id='answer-label-1427354' class=' answer'><span>DNS (Domain Name System)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-366318'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>Which network security feature helps protect against unauthorized data access and ensures confidentiality of sensitive information?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='366318' \/><input type='hidden' id='answerType366318' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366318[]' id='answer-id-1427355' class='answer   answerof-366318 ' value='1427355'   \/><label for='answer-id-1427355' id='answer-label-1427355' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366318[]' id='answer-id-1427356' class='answer   answerof-366318 ' value='1427356'   \/><label for='answer-id-1427356' id='answer-label-1427356' class=' answer'><span>VPN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366318[]' id='answer-id-1427357' class='answer   answerof-366318 ' value='1427357'   \/><label for='answer-id-1427357' id='answer-label-1427357' class=' answer'><span>Intrusion Detection System<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366318[]' id='answer-id-1427358' class='answer   answerof-366318 ' value='1427358'   \/><label for='answer-id-1427358' id='answer-label-1427358' class=' answer'><span>Antivirus<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-366319'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>What is a key principle of securing data in the cloud?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='366319' \/><input type='hidden' id='answerType366319' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366319[]' id='answer-id-1427359' class='answer   answerof-366319 ' value='1427359'   \/><label for='answer-id-1427359' id='answer-label-1427359' class=' answer'><span>Implementing strong physical security measures<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366319[]' id='answer-id-1427360' class='answer   answerof-366319 ' value='1427360'   \/><label for='answer-id-1427360' id='answer-label-1427360' class=' answer'><span>Encrypting data at rest and in transit<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366319[]' id='answer-id-1427361' class='answer   answerof-366319 ' value='1427361'   \/><label for='answer-id-1427361' id='answer-label-1427361' class=' answer'><span>Using complex passwords for all cloud users<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366319[]' id='answer-id-1427362' class='answer   answerof-366319 ' value='1427362'   \/><label for='answer-id-1427362' id='answer-label-1427362' class=' answer'><span>Limiting access to the cloud from specific IP addresses<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-366320'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>What is the purpose of a firewall in a network security system?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='366320' \/><input type='hidden' id='answerType366320' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366320[]' id='answer-id-1427363' class='answer   answerof-366320 ' value='1427363'   \/><label for='answer-id-1427363' id='answer-label-1427363' class=' answer'><span>To prevent unauthorized access to or from private networks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366320[]' id='answer-id-1427364' class='answer   answerof-366320 ' value='1427364'   \/><label for='answer-id-1427364' id='answer-label-1427364' class=' answer'><span>To scan and filter network traffic for potential threats<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366320[]' id='answer-id-1427365' class='answer   answerof-366320 ' value='1427365'   \/><label for='answer-id-1427365' id='answer-label-1427365' class=' answer'><span>To encrypt data transmitted over the network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366320[]' id='answer-id-1427366' class='answer   answerof-366320 ' value='1427366'   \/><label for='answer-id-1427366' id='answer-label-1427366' class=' answer'><span>To provide secure remote access to the network<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-366321'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>Which of the following is true regarding the incident response process?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='366321' \/><input type='hidden' id='answerType366321' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366321[]' id='answer-id-1427367' class='answer   answerof-366321 ' value='1427367'   \/><label for='answer-id-1427367' id='answer-label-1427367' class=' answer'><span>It is a reactive process that is only initiated after an incident has occurred.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366321[]' id='answer-id-1427368' class='answer   answerof-366321 ' value='1427368'   \/><label for='answer-id-1427368' id='answer-label-1427368' class=' answer'><span>It is a proactive process that focuses on preventing incidents from occurring.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366321[]' id='answer-id-1427369' class='answer   answerof-366321 ' value='1427369'   \/><label for='answer-id-1427369' id='answer-label-1427369' class=' answer'><span>It is an iterative process that involves continuous improvement based on lessons learned.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366321[]' id='answer-id-1427370' class='answer   answerof-366321 ' value='1427370'   \/><label for='answer-id-1427370' id='answer-label-1427370' class=' answer'><span>It is a one-time process that is only performed when an organization first establishes its security program.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-366322'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>Which of the following is true about security policies and procedures?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='366322' \/><input type='hidden' id='answerType366322' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366322[]' id='answer-id-1427371' class='answer   answerof-366322 ' value='1427371'   \/><label for='answer-id-1427371' id='answer-label-1427371' class=' answer'><span>They should be regularly reviewed and updated to reflect changing threats and technologies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366322[]' id='answer-id-1427372' class='answer   answerof-366322 ' value='1427372'   \/><label for='answer-id-1427372' id='answer-label-1427372' class=' answer'><span>They should only be accessible to the IT department.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366322[]' id='answer-id-1427373' class='answer   answerof-366322 ' value='1427373'   \/><label for='answer-id-1427373' id='answer-label-1427373' class=' answer'><span>They should be documented once and never changed.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366322[]' id='answer-id-1427374' class='answer   answerof-366322 ' value='1427374'   \/><label for='answer-id-1427374' id='answer-label-1427374' class=' answer'><span>They should be kept confidential and not shared with employees.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-366323'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>Which of the following is a key requirement for conducting a security compliance audit?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='366323' \/><input type='hidden' id='answerType366323' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366323[]' id='answer-id-1427375' class='answer   answerof-366323 ' value='1427375'   \/><label for='answer-id-1427375' id='answer-label-1427375' class=' answer'><span>A comprehensive understanding of security compliance standards and regulations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366323[]' id='answer-id-1427376' class='answer   answerof-366323 ' value='1427376'   \/><label for='answer-id-1427376' id='answer-label-1427376' class=' answer'><span>A certified auditor with expertise in security compliance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366323[]' id='answer-id-1427377' class='answer   answerof-366323 ' value='1427377'   \/><label for='answer-id-1427377' id='answer-label-1427377' class=' answer'><span>Compliance monitoring tools and systems<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366323[]' id='answer-id-1427378' class='answer   answerof-366323 ' value='1427378'   \/><label for='answer-id-1427378' id='answer-label-1427378' class=' answer'><span>A detailed audit plan and checklist<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-366324'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Which of the following is a characteristic of a network-based firewall?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='366324' \/><input type='hidden' id='answerType366324' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366324[]' id='answer-id-1427379' class='answer   answerof-366324 ' value='1427379'   \/><label for='answer-id-1427379' id='answer-label-1427379' class=' answer'><span>Inspects and filters traffic at the application layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366324[]' id='answer-id-1427380' class='answer   answerof-366324 ' value='1427380'   \/><label for='answer-id-1427380' id='answer-label-1427380' class=' answer'><span>Operates at the data link layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366324[]' id='answer-id-1427381' class='answer   answerof-366324 ' value='1427381'   \/><label for='answer-id-1427381' id='answer-label-1427381' class=' answer'><span>Provides protection against external threats only<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366324[]' id='answer-id-1427382' class='answer   answerof-366324 ' value='1427382'   \/><label for='answer-id-1427382' id='answer-label-1427382' class=' answer'><span>Requires software installed on client devices<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-366325'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>Which of the following is the most secure and recommended method for storing sensitive user data in a database?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='366325' \/><input type='hidden' id='answerType366325' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366325[]' id='answer-id-1427383' class='answer   answerof-366325 ' value='1427383'   \/><label for='answer-id-1427383' id='answer-label-1427383' class=' answer'><span>Storing the data in plain text<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366325[]' id='answer-id-1427384' class='answer   answerof-366325 ' value='1427384'   \/><label for='answer-id-1427384' id='answer-label-1427384' class=' answer'><span>Using symmetric encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366325[]' id='answer-id-1427385' class='answer   answerof-366325 ' value='1427385'   \/><label for='answer-id-1427385' id='answer-label-1427385' class=' answer'><span>Using hashing algorithms<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366325[]' id='answer-id-1427386' class='answer   answerof-366325 ' value='1427386'   \/><label for='answer-id-1427386' id='answer-label-1427386' class=' answer'><span>Using asymmetric encryption<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-366326'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>What is the purpose of Security Information and Event Management (SIEM) systems?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='366326' \/><input type='hidden' id='answerType366326' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366326[]' id='answer-id-1427387' class='answer   answerof-366326 ' value='1427387'   \/><label for='answer-id-1427387' id='answer-label-1427387' class=' answer'><span>To analyze network traffic and detect potential security threats.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366326[]' id='answer-id-1427388' class='answer   answerof-366326 ' value='1427388'   \/><label for='answer-id-1427388' id='answer-label-1427388' class=' answer'><span>To centrally collect, store, and analyze logs from various systems to detect and respond to security incidents.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366326[]' id='answer-id-1427389' class='answer   answerof-366326 ' value='1427389'   \/><label for='answer-id-1427389' id='answer-label-1427389' class=' answer'><span>To encrypt sensitive data to protect it from unauthorized access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366326[]' id='answer-id-1427390' class='answer   answerof-366326 ' value='1427390'   \/><label for='answer-id-1427390' id='answer-label-1427390' class=' answer'><span>To authenticate and authorize users to access network resources.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-366327'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>Which of the following is a security best practice for securing data in the cloud?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='366327' \/><input type='hidden' id='answerType366327' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366327[]' id='answer-id-1427391' class='answer   answerof-366327 ' value='1427391'   \/><label for='answer-id-1427391' id='answer-label-1427391' class=' answer'><span>Storing sensitive data in clear text<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366327[]' id='answer-id-1427392' class='answer   answerof-366327 ' value='1427392'   \/><label for='answer-id-1427392' id='answer-label-1427392' class=' answer'><span>Implementing multi-factor authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366327[]' id='answer-id-1427393' class='answer   answerof-366327 ' value='1427393'   \/><label for='answer-id-1427393' id='answer-label-1427393' class=' answer'><span>Allowing unrestricted access to data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366327[]' id='answer-id-1427394' class='answer   answerof-366327 ' value='1427394'   \/><label for='answer-id-1427394' id='answer-label-1427394' class=' answer'><span>Using weak passwords<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-366328'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>Which of the following is a principle of data security?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='366328' \/><input type='hidden' id='answerType366328' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366328[]' id='answer-id-1427395' class='answer   answerof-366328 ' value='1427395'   \/><label for='answer-id-1427395' id='answer-label-1427395' class=' answer'><span>Encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366328[]' id='answer-id-1427396' class='answer   answerof-366328 ' value='1427396'   \/><label for='answer-id-1427396' id='answer-label-1427396' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366328[]' id='answer-id-1427397' class='answer   answerof-366328 ' value='1427397'   \/><label for='answer-id-1427397' id='answer-label-1427397' class=' answer'><span>Intrusion Detection System<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366328[]' id='answer-id-1427398' class='answer   answerof-366328 ' value='1427398'   \/><label for='answer-id-1427398' id='answer-label-1427398' class=' answer'><span>Data Masking<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-366329'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Which of the following features of the Cisco Identity Services Engine (ISE) allows network administrators to define policies for controlling access to network resources based on user identities and user or group attributes?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='366329' \/><input type='hidden' id='answerType366329' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366329[]' id='answer-id-1427399' class='answer   answerof-366329 ' value='1427399'   \/><label for='answer-id-1427399' id='answer-label-1427399' class=' answer'><span>Network Access Profiles<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366329[]' id='answer-id-1427400' class='answer   answerof-366329 ' value='1427400'   \/><label for='answer-id-1427400' id='answer-label-1427400' class=' answer'><span>Identity Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366329[]' id='answer-id-1427401' class='answer   answerof-366329 ' value='1427401'   \/><label for='answer-id-1427401' id='answer-label-1427401' class=' answer'><span>Profiling<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366329[]' id='answer-id-1427402' class='answer   answerof-366329 ' value='1427402'   \/><label for='answer-id-1427402' id='answer-label-1427402' class=' answer'><span>TrustSec<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-366330'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>What is the purpose of multi-factor authentication?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='366330' \/><input type='hidden' id='answerType366330' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366330[]' id='answer-id-1427403' class='answer   answerof-366330 ' value='1427403'   \/><label for='answer-id-1427403' id='answer-label-1427403' class=' answer'><span>To provide multiple layers of security by requiring users to provide more than one form of identification<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366330[]' id='answer-id-1427404' class='answer   answerof-366330 ' value='1427404'   \/><label for='answer-id-1427404' id='answer-label-1427404' class=' answer'><span>To simplify the login process by only requiring one form of identification<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366330[]' id='answer-id-1427405' class='answer   answerof-366330 ' value='1427405'   \/><label for='answer-id-1427405' id='answer-label-1427405' class=' answer'><span>To restrict access to certain users by requiring additional authorization<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366330[]' id='answer-id-1427406' class='answer   answerof-366330 ' value='1427406'   \/><label for='answer-id-1427406' id='answer-label-1427406' class=' answer'><span>To prevent unauthorized access by encrypting user credentials<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-366331'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>What is a common vulnerability in cloud-based systems?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='366331' \/><input type='hidden' id='answerType366331' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366331[]' id='answer-id-1427407' class='answer   answerof-366331 ' value='1427407'   \/><label for='answer-id-1427407' id='answer-label-1427407' class=' answer'><span>Inadequate access controls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366331[]' id='answer-id-1427408' class='answer   answerof-366331 ' value='1427408'   \/><label for='answer-id-1427408' id='answer-label-1427408' class=' answer'><span>Outdated antivirus software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366331[]' id='answer-id-1427409' class='answer   answerof-366331 ' value='1427409'   \/><label for='answer-id-1427409' id='answer-label-1427409' class=' answer'><span>Weak passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366331[]' id='answer-id-1427410' class='answer   answerof-366331 ' value='1427410'   \/><label for='answer-id-1427410' id='answer-label-1427410' class=' answer'><span>Lack of network segmentation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-366332'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Which of the following is a best practice for managing security policies and procedures?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='366332' \/><input type='hidden' id='answerType366332' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366332[]' id='answer-id-1427411' class='answer   answerof-366332 ' value='1427411'   \/><label for='answer-id-1427411' id='answer-label-1427411' class=' answer'><span>Implementing a regular review process for security policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366332[]' id='answer-id-1427412' class='answer   answerof-366332 ' value='1427412'   \/><label for='answer-id-1427412' id='answer-label-1427412' class=' answer'><span>Relying solely on default security settings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366332[]' id='answer-id-1427413' class='answer   answerof-366332 ' value='1427413'   \/><label for='answer-id-1427413' id='answer-label-1427413' class=' answer'><span>Allowing users to create and manage their own security policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366332[]' id='answer-id-1427414' class='answer   answerof-366332 ' value='1427414'   \/><label for='answer-id-1427414' id='answer-label-1427414' class=' answer'><span>Not documenting the security policies and procedures<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-366333'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>Which of the following is a best practice for implementing strong password policies within an organization?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='366333' \/><input type='hidden' id='answerType366333' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366333[]' id='answer-id-1427415' class='answer   answerof-366333 ' value='1427415'   \/><label for='answer-id-1427415' id='answer-label-1427415' class=' answer'><span>Allowing users to choose their own passwords, regardless of complexity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366333[]' id='answer-id-1427416' class='answer   answerof-366333 ' value='1427416'   \/><label for='answer-id-1427416' id='answer-label-1427416' class=' answer'><span>Requiring users to change their password every 90 days<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366333[]' id='answer-id-1427417' class='answer   answerof-366333 ' value='1427417'   \/><label for='answer-id-1427417' id='answer-label-1427417' class=' answer'><span>Storing passwords in clear text in a central database<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366333[]' id='answer-id-1427418' class='answer   answerof-366333 ' value='1427418'   \/><label for='answer-id-1427418' id='answer-label-1427418' class=' answer'><span>Allowing users to reuse their previous passwords<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-366334'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>What is the primary reason for implementing multi-factor authentication in a cloud environment?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='366334' \/><input type='hidden' id='answerType366334' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366334[]' id='answer-id-1427419' class='answer   answerof-366334 ' value='1427419'   \/><label for='answer-id-1427419' id='answer-label-1427419' class=' answer'><span>To provide an additional layer of security<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366334[]' id='answer-id-1427420' class='answer   answerof-366334 ' value='1427420'   \/><label for='answer-id-1427420' id='answer-label-1427420' class=' answer'><span>To simplify the authentication process<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366334[]' id='answer-id-1427421' class='answer   answerof-366334 ' value='1427421'   \/><label for='answer-id-1427421' id='answer-label-1427421' class=' answer'><span>To reduce costs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366334[]' id='answer-id-1427422' class='answer   answerof-366334 ' value='1427422'   \/><label for='answer-id-1427422' id='answer-label-1427422' class=' answer'><span>To improve performance<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-366335'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>Which security feature provides network segmentation by creating virtual networks?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='366335' \/><input type='hidden' id='answerType366335' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366335[]' id='answer-id-1427423' class='answer   answerof-366335 ' value='1427423'   \/><label for='answer-id-1427423' id='answer-label-1427423' class=' answer'><span>VLANs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366335[]' id='answer-id-1427424' class='answer   answerof-366335 ' value='1427424'   \/><label for='answer-id-1427424' id='answer-label-1427424' class=' answer'><span>VLANs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366335[]' id='answer-id-1427425' class='answer   answerof-366335 ' value='1427425'   \/><label for='answer-id-1427425' id='answer-label-1427425' class=' answer'><span>Intrusion Prevention System (IPS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366335[]' id='answer-id-1427426' class='answer   answerof-366335 ' value='1427426'   \/><label for='answer-id-1427426' id='answer-label-1427426' class=' answer'><span>Virtual Private Network (VPN)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-366336'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>Which of the following is a network security device that operates at the session layer of the OSI model?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='366336' \/><input type='hidden' id='answerType366336' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366336[]' id='answer-id-1427427' class='answer   answerof-366336 ' value='1427427'   \/><label for='answer-id-1427427' id='answer-label-1427427' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366336[]' id='answer-id-1427428' class='answer   answerof-366336 ' value='1427428'   \/><label for='answer-id-1427428' id='answer-label-1427428' class=' answer'><span>Intrusion Detection System (IDS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366336[]' id='answer-id-1427429' class='answer   answerof-366336 ' value='1427429'   \/><label for='answer-id-1427429' id='answer-label-1427429' class=' answer'><span>Intrusion Prevention System (IPS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366336[]' id='answer-id-1427430' class='answer   answerof-366336 ' value='1427430'   \/><label for='answer-id-1427430' id='answer-label-1427430' class=' answer'><span>SSL\/TLS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-366337'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>Which of the following is a feature of cloud computing?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='366337' \/><input type='hidden' id='answerType366337' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366337[]' id='answer-id-1427431' class='answer   answerof-366337 ' value='1427431'   \/><label for='answer-id-1427431' id='answer-label-1427431' class=' answer'><span>On-premises hosting<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366337[]' id='answer-id-1427432' class='answer   answerof-366337 ' value='1427432'   \/><label for='answer-id-1427432' id='answer-label-1427432' class=' answer'><span>Hardware provisioning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366337[]' id='answer-id-1427433' class='answer   answerof-366337 ' value='1427433'   \/><label for='answer-id-1427433' id='answer-label-1427433' class=' answer'><span>Data encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366337[]' id='answer-id-1427434' class='answer   answerof-366337 ' value='1427434'   \/><label for='answer-id-1427434' id='answer-label-1427434' class=' answer'><span>Physical server maintenance<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-366338'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>Which security technology uses an agent-based approach to protect endpoints and is designed to detect and prevent malicious activities?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='366338' \/><input type='hidden' id='answerType366338' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366338[]' id='answer-id-1427435' class='answer   answerof-366338 ' value='1427435'   \/><label for='answer-id-1427435' id='answer-label-1427435' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366338[]' id='answer-id-1427436' class='answer   answerof-366338 ' value='1427436'   \/><label for='answer-id-1427436' id='answer-label-1427436' class=' answer'><span>Intrusion Prevention System (IPS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366338[]' id='answer-id-1427437' class='answer   answerof-366338 ' value='1427437'   \/><label for='answer-id-1427437' id='answer-label-1427437' class=' answer'><span>Data Loss Prevention (DLP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366338[]' id='answer-id-1427438' class='answer   answerof-366338 ' value='1427438'   \/><label for='answer-id-1427438' id='answer-label-1427438' class=' answer'><span>Advanced Malware Protection (AMP)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-366339'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>Which of the following is true regarding secure web gateways (SWG)?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='366339' \/><input type='hidden' id='answerType366339' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366339[]' id='answer-id-1427439' class='answer   answerof-366339 ' value='1427439'   \/><label for='answer-id-1427439' id='answer-label-1427439' class=' answer'><span>SWGs provide protection against malware and advanced threats<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366339[]' id='answer-id-1427440' class='answer   answerof-366339 ' value='1427440'   \/><label for='answer-id-1427440' id='answer-label-1427440' class=' answer'><span>SWGs are primarily used to secure internal web applications.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366339[]' id='answer-id-1427441' class='answer   answerof-366339 ' value='1427441'   \/><label for='answer-id-1427441' id='answer-label-1427441' class=' answer'><span>SWGs are no longer necessary with the advent of cloud-based applications.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366339[]' id='answer-id-1427442' class='answer   answerof-366339 ' value='1427442'   \/><label for='answer-id-1427442' id='answer-label-1427442' class=' answer'><span>SWGs can only be deployed on-premises<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-366340'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Which feature allows endpoints to communicate directly with each other, bypassing the network?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='366340' \/><input type='hidden' id='answerType366340' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366340[]' id='answer-id-1427443' class='answer   answerof-366340 ' value='1427443'   \/><label for='answer-id-1427443' id='answer-label-1427443' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366340[]' id='answer-id-1427444' class='answer   answerof-366340 ' value='1427444'   \/><label for='answer-id-1427444' id='answer-label-1427444' class=' answer'><span>IPS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366340[]' id='answer-id-1427445' class='answer   answerof-366340 ' value='1427445'   \/><label for='answer-id-1427445' id='answer-label-1427445' class=' answer'><span>VPN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366340[]' id='answer-id-1427446' class='answer   answerof-366340 ' value='1427446'   \/><label for='answer-id-1427446' id='answer-label-1427446' class=' answer'><span>Peer-to-Peer<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-366341'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>Which of the following is a data protection technique that involves the transformation of data into a format that is unreadable to unauthorized users?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='366341' \/><input type='hidden' id='answerType366341' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366341[]' id='answer-id-1427447' class='answer   answerof-366341 ' value='1427447'   \/><label for='answer-id-1427447' id='answer-label-1427447' class=' answer'><span>Authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366341[]' id='answer-id-1427448' class='answer   answerof-366341 ' value='1427448'   \/><label for='answer-id-1427448' id='answer-label-1427448' class=' answer'><span>Encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366341[]' id='answer-id-1427449' class='answer   answerof-366341 ' value='1427449'   \/><label for='answer-id-1427449' id='answer-label-1427449' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366341[]' id='answer-id-1427450' class='answer   answerof-366341 ' value='1427450'   \/><label for='answer-id-1427450' id='answer-label-1427450' class=' answer'><span>Intrusion Detection System<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-366342'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>Which of the following protocols can be used to securely transfer files over a network?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='366342' \/><input type='hidden' id='answerType366342' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366342[]' id='answer-id-1427451' class='answer   answerof-366342 ' value='1427451'   \/><label for='answer-id-1427451' id='answer-label-1427451' class=' answer'><span>HTTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366342[]' id='answer-id-1427452' class='answer   answerof-366342 ' value='1427452'   \/><label for='answer-id-1427452' id='answer-label-1427452' class=' answer'><span>FTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366342[]' id='answer-id-1427453' class='answer   answerof-366342 ' value='1427453'   \/><label for='answer-id-1427453' id='answer-label-1427453' class=' answer'><span>SMTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366342[]' id='answer-id-1427454' class='answer   answerof-366342 ' value='1427454'   \/><label for='answer-id-1427454' id='answer-label-1427454' class=' answer'><span>DNS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-366343'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>Which of the following is an example of a data security principle?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='366343' \/><input type='hidden' id='answerType366343' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366343[]' id='answer-id-1427455' class='answer   answerof-366343 ' value='1427455'   \/><label for='answer-id-1427455' id='answer-label-1427455' class=' answer'><span>Least Privilege<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366343[]' id='answer-id-1427456' class='answer   answerof-366343 ' value='1427456'   \/><label for='answer-id-1427456' id='answer-label-1427456' class=' answer'><span>Session Management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366343[]' id='answer-id-1427457' class='answer   answerof-366343 ' value='1427457'   \/><label for='answer-id-1427457' id='answer-label-1427457' class=' answer'><span>ARP Spoofing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366343[]' id='answer-id-1427458' class='answer   answerof-366343 ' value='1427458'   \/><label for='answer-id-1427458' id='answer-label-1427458' class=' answer'><span>Ciphertext<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-366344'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>Which of the following is a common security threat that targets web applications?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='366344' \/><input type='hidden' id='answerType366344' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366344[]' id='answer-id-1427459' class='answer   answerof-366344 ' value='1427459'   \/><label for='answer-id-1427459' id='answer-label-1427459' class=' answer'><span>SQL injection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366344[]' id='answer-id-1427460' class='answer   answerof-366344 ' value='1427460'   \/><label for='answer-id-1427460' id='answer-label-1427460' class=' answer'><span>DNS poisoning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366344[]' id='answer-id-1427461' class='answer   answerof-366344 ' value='1427461'   \/><label for='answer-id-1427461' id='answer-label-1427461' class=' answer'><span>Man-in-the-middle attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366344[]' id='answer-id-1427462' class='answer   answerof-366344 ' value='1427462'   \/><label for='answer-id-1427462' id='answer-label-1427462' class=' answer'><span>Distributed Denial of Service (DDoS)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-366345'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>Which network infrastructure component allows for the translation of domain names to IP addresses?<\/div><input type='hidden' name='question_id[]' id='qID_31' value='366345' \/><input type='hidden' id='answerType366345' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366345[]' id='answer-id-1427463' class='answer   answerof-366345 ' value='1427463'   \/><label for='answer-id-1427463' id='answer-label-1427463' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366345[]' id='answer-id-1427464' class='answer   answerof-366345 ' value='1427464'   \/><label for='answer-id-1427464' id='answer-label-1427464' class=' answer'><span>Router<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366345[]' id='answer-id-1427465' class='answer   answerof-366345 ' value='1427465'   \/><label for='answer-id-1427465' id='answer-label-1427465' class=' answer'><span>DNS server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366345[]' id='answer-id-1427466' class='answer   answerof-366345 ' value='1427466'   \/><label for='answer-id-1427466' id='answer-label-1427466' class=' answer'><span>DHCP server<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-366346'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>What is malware?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='366346' \/><input type='hidden' id='answerType366346' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366346[]' id='answer-id-1427467' class='answer   answerof-366346 ' value='1427467'   \/><label for='answer-id-1427467' id='answer-label-1427467' class=' answer'><span>A form of cyber attack that attempts to gain unauthorized access to a network.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366346[]' id='answer-id-1427468' class='answer   answerof-366346 ' value='1427468'   \/><label for='answer-id-1427468' id='answer-label-1427468' class=' answer'><span>A software program that is designed to damage, disrupt, or gain unauthorized access to a computer system.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366346[]' id='answer-id-1427469' class='answer   answerof-366346 ' value='1427469'   \/><label for='answer-id-1427469' id='answer-label-1427469' class=' answer'><span>A technique used by attackers to obtain sensitive information through deception.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366346[]' id='answer-id-1427470' class='answer   answerof-366346 ' value='1427470'   \/><label for='answer-id-1427470' id='answer-label-1427470' class=' answer'><span>A network of compromised computers used to carry out coordinated attacks.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-366347'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>Which of the following encryption algorithms is considered strong?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='366347' \/><input type='hidden' id='answerType366347' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366347[]' id='answer-id-1427471' class='answer   answerof-366347 ' value='1427471'   \/><label for='answer-id-1427471' id='answer-label-1427471' class=' answer'><span>RSA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366347[]' id='answer-id-1427472' class='answer   answerof-366347 ' value='1427472'   \/><label for='answer-id-1427472' id='answer-label-1427472' class=' answer'><span>MD5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366347[]' id='answer-id-1427473' class='answer   answerof-366347 ' value='1427473'   \/><label for='answer-id-1427473' id='answer-label-1427473' class=' answer'><span>ROT13<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366347[]' id='answer-id-1427474' class='answer   answerof-366347 ' value='1427474'   \/><label for='answer-id-1427474' id='answer-label-1427474' class=' answer'><span>DES<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-366348'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>Which of the following password policies is considered a best practice?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='366348' \/><input type='hidden' id='answerType366348' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366348[]' id='answer-id-1427475' class='answer   answerof-366348 ' value='1427475'   \/><label for='answer-id-1427475' id='answer-label-1427475' class=' answer'><span>Requiring passwords to be changed every 5 years<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366348[]' id='answer-id-1427476' class='answer   answerof-366348 ' value='1427476'   \/><label for='answer-id-1427476' id='answer-label-1427476' class=' answer'><span>Allowing users to set easily guessable passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366348[]' id='answer-id-1427477' class='answer   answerof-366348 ' value='1427477'   \/><label for='answer-id-1427477' id='answer-label-1427477' class=' answer'><span>Enforcing a minimum password length and complexity requirements<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366348[]' id='answer-id-1427478' class='answer   answerof-366348 ' value='1427478'   \/><label for='answer-id-1427478' id='answer-label-1427478' class=' answer'><span>Storing passwords in plain text format<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-366349'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>What does hardening mean in the context of cybersecurity?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='366349' \/><input type='hidden' id='answerType366349' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366349[]' id='answer-id-1427479' class='answer   answerof-366349 ' value='1427479'   \/><label for='answer-id-1427479' id='answer-label-1427479' class=' answer'><span>Removing all vulnerabilities from a system or network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366349[]' id='answer-id-1427480' class='answer   answerof-366349 ' value='1427480'   \/><label for='answer-id-1427480' id='answer-label-1427480' class=' answer'><span>Implementing cybersecurity policies and regulations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366349[]' id='answer-id-1427481' class='answer   answerof-366349 ' value='1427481'   \/><label for='answer-id-1427481' id='answer-label-1427481' class=' answer'><span>Creating a backup of critical data and configurations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366349[]' id='answer-id-1427482' class='answer   answerof-366349 ' value='1427482'   \/><label for='answer-id-1427482' id='answer-label-1427482' class=' answer'><span>Making a system more resistant to threats and attacks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-366350'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>Which encryption method is used to secure data while it is being actively used and processed by an application?<\/div><input type='hidden' name='question_id[]' id='qID_36' value='366350' \/><input type='hidden' id='answerType366350' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366350[]' id='answer-id-1427483' class='answer   answerof-366350 ' value='1427483'   \/><label for='answer-id-1427483' id='answer-label-1427483' class=' answer'><span>Asymmetric encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366350[]' id='answer-id-1427484' class='answer   answerof-366350 ' value='1427484'   \/><label for='answer-id-1427484' id='answer-label-1427484' class=' answer'><span>Homomorphic encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366350[]' id='answer-id-1427485' class='answer   answerof-366350 ' value='1427485'   \/><label for='answer-id-1427485' id='answer-label-1427485' class=' answer'><span>Secure Sockets Layer (SSL)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366350[]' id='answer-id-1427486' class='answer   answerof-366350 ' value='1427486'   \/><label for='answer-id-1427486' id='answer-label-1427486' class=' answer'><span>Hash encryption<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-366351'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>What type of encryption is used to secure data that is stored on a hard drive or other storage media?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='366351' \/><input type='hidden' id='answerType366351' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366351[]' id='answer-id-1427487' class='answer   answerof-366351 ' value='1427487'   \/><label for='answer-id-1427487' id='answer-label-1427487' class=' answer'><span>File-based encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366351[]' id='answer-id-1427488' class='answer   answerof-366351 ' value='1427488'   \/><label for='answer-id-1427488' id='answer-label-1427488' class=' answer'><span>Hash encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366351[]' id='answer-id-1427489' class='answer   answerof-366351 ' value='1427489'   \/><label for='answer-id-1427489' id='answer-label-1427489' class=' answer'><span>Symmetric encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366351[]' id='answer-id-1427490' class='answer   answerof-366351 ' value='1427490'   \/><label for='answer-id-1427490' id='answer-label-1427490' class=' answer'><span>Public Key Infrastructure (PKI)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-366352'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>Which of the following is a characteristic of cloud-based applications in the context of cybersecurity?<\/div><input type='hidden' name='question_id[]' id='qID_38' value='366352' \/><input type='hidden' id='answerType366352' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366352[]' id='answer-id-1427491' class='answer   answerof-366352 ' value='1427491'   \/><label for='answer-id-1427491' id='answer-label-1427491' class=' answer'><span>They provide enhanced flexibility and scalability for organizations.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366352[]' id='answer-id-1427492' class='answer   answerof-366352 ' value='1427492'   \/><label for='answer-id-1427492' id='answer-label-1427492' class=' answer'><span>They are not widely used and are considered a less secure option.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366352[]' id='answer-id-1427493' class='answer   answerof-366352 ' value='1427493'   \/><label for='answer-id-1427493' id='answer-label-1427493' class=' answer'><span>They require physical installation and maintenance, limiting their accessibility.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366352[]' id='answer-id-1427494' class='answer   answerof-366352 ' value='1427494'   \/><label for='answer-id-1427494' id='answer-label-1427494' class=' answer'><span>They are typically more susceptible to cyber attacks compared to traditional on-premises \r\napplications.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-366353'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>Which of the following is a characteristic of an IPv6 address?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='366353' \/><input type='hidden' id='answerType366353' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366353[]' id='answer-id-1427495' class='answer   answerof-366353 ' value='1427495'   \/><label for='answer-id-1427495' id='answer-label-1427495' class=' answer'><span>Uses colons as separators<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366353[]' id='answer-id-1427496' class='answer   answerof-366353 ' value='1427496'   \/><label for='answer-id-1427496' id='answer-label-1427496' class=' answer'><span>Can be represented by both decimal and binary notation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366353[]' id='answer-id-1427497' class='answer   answerof-366353 ' value='1427497'   \/><label for='answer-id-1427497' id='answer-label-1427497' class=' answer'><span>Supports a maximum of 4.3 billion unique addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366353[]' id='answer-id-1427498' class='answer   answerof-366353 ' value='1427498'   \/><label for='answer-id-1427498' id='answer-label-1427498' class=' answer'><span>Consists of 32 bits<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-366354'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>Which of the following represents a technique used in Classless Inter-Domain Routing (CIDR)?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='366354' \/><input type='hidden' id='answerType366354' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366354[]' id='answer-id-1427499' class='answer   answerof-366354 ' value='1427499'   \/><label for='answer-id-1427499' id='answer-label-1427499' class=' answer'><span>Variable-length subnet masks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366354[]' id='answer-id-1427500' class='answer   answerof-366354 ' value='1427500'   \/><label for='answer-id-1427500' id='answer-label-1427500' class=' answer'><span>Compressed MAC addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366354[]' id='answer-id-1427501' class='answer   answerof-366354 ' value='1427501'   \/><label for='answer-id-1427501' id='answer-label-1427501' class=' answer'><span>Binary notation for IP addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366354[]' id='answer-id-1427502' class='answer   answerof-366354 ' value='1427502'   \/><label for='answer-id-1427502' id='answer-label-1427502' class=' answer'><span>32-bit IP addresses<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-366355'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>Which of the following describes the purpose of a VPN (Virtual Private Network)?<\/div><input type='hidden' name='question_id[]' id='qID_41' value='366355' \/><input type='hidden' id='answerType366355' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366355[]' id='answer-id-1427503' class='answer   answerof-366355 ' value='1427503'   \/><label for='answer-id-1427503' id='answer-label-1427503' class=' answer'><span>To improve network performance and reduce latency<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366355[]' id='answer-id-1427504' class='answer   answerof-366355 ' value='1427504'   \/><label for='answer-id-1427504' id='answer-label-1427504' class=' answer'><span>To segment a network into multiple smaller networks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366355[]' id='answer-id-1427505' class='answer   answerof-366355 ' value='1427505'   \/><label for='answer-id-1427505' id='answer-label-1427505' class=' answer'><span>To provide secure remote access to a private network over the internet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366355[]' id='answer-id-1427506' class='answer   answerof-366355 ' value='1427506'   \/><label for='answer-id-1427506' id='answer-label-1427506' class=' answer'><span>To control and filter network traffic based on predefined policies<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-366356'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>What is the main difference between a public and a private network?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='366356' \/><input type='hidden' id='answerType366356' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366356[]' id='answer-id-1427507' class='answer   answerof-366356 ' value='1427507'   \/><label for='answer-id-1427507' id='answer-label-1427507' class=' answer'><span>Public networks are secured, while private networks are not<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366356[]' id='answer-id-1427508' class='answer   answerof-366356 ' value='1427508'   \/><label for='answer-id-1427508' id='answer-label-1427508' class=' answer'><span>Private networks are more expensive to set up than public networks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366356[]' id='answer-id-1427509' class='answer   answerof-366356 ' value='1427509'   \/><label for='answer-id-1427509' id='answer-label-1427509' class=' answer'><span>Public networks use public IP addresses, while private networks use private IP addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366356[]' id='answer-id-1427510' class='answer   answerof-366356 ' value='1427510'   \/><label for='answer-id-1427510' id='answer-label-1427510' class=' answer'><span>Private networks are accessible to the general public, while public networks are not<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-366357'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>What is one of the ethical principles that guide the code of ethics for cybersecurity professionals?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='366357' \/><input type='hidden' id='answerType366357' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366357[]' id='answer-id-1427511' class='answer   answerof-366357 ' value='1427511'   \/><label for='answer-id-1427511' id='answer-label-1427511' class=' answer'><span>Impersonation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366357[]' id='answer-id-1427512' class='answer   answerof-366357 ' value='1427512'   \/><label for='answer-id-1427512' id='answer-label-1427512' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366357[]' id='answer-id-1427513' class='answer   answerof-366357 ' value='1427513'   \/><label for='answer-id-1427513' id='answer-label-1427513' class=' answer'><span>Anonymity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366357[]' id='answer-id-1427514' class='answer   answerof-366357 ' value='1427514'   \/><label for='answer-id-1427514' id='answer-label-1427514' class=' answer'><span>Discrimination<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-366358'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>Which of the following best describes network security?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='366358' \/><input type='hidden' id='answerType366358' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366358[]' id='answer-id-1427515' class='answer   answerof-366358 ' value='1427515'   \/><label for='answer-id-1427515' id='answer-label-1427515' class=' answer'><span>Ensuring high availability and performance of the network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366358[]' id='answer-id-1427516' class='answer   answerof-366358 ' value='1427516'   \/><label for='answer-id-1427516' id='answer-label-1427516' class=' answer'><span>Securing physical access to network devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366358[]' id='answer-id-1427517' class='answer   answerof-366358 ' value='1427517'   \/><label for='answer-id-1427517' id='answer-label-1427517' class=' answer'><span>Protecting data from unauthorized access or modifications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366358[]' id='answer-id-1427518' class='answer   answerof-366358 ' value='1427518'   \/><label for='answer-id-1427518' id='answer-label-1427518' class=' answer'><span>Preventing network configuration errors<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-366359'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>Which of the following is a characteristic of weak encryption algorithms?<\/div><input type='hidden' name='question_id[]' id='qID_45' value='366359' \/><input type='hidden' id='answerType366359' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366359[]' id='answer-id-1427519' class='answer   answerof-366359 ' value='1427519'   \/><label for='answer-id-1427519' id='answer-label-1427519' class=' answer'><span>They support secure communication protocols.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366359[]' id='answer-id-1427520' class='answer   answerof-366359 ' value='1427520'   \/><label for='answer-id-1427520' id='answer-label-1427520' class=' answer'><span>They are susceptible to cryptanalysis attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366359[]' id='answer-id-1427521' class='answer   answerof-366359 ' value='1427521'   \/><label for='answer-id-1427521' id='answer-label-1427521' class=' answer'><span>They are resistant to brute force attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366359[]' id='answer-id-1427522' class='answer   answerof-366359 ' value='1427522'   \/><label for='answer-id-1427522' id='answer-label-1427522' class=' answer'><span>They provide encryption keys with longer bit lengths.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-366360'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>What is the primary purpose of a VPN (Virtual Private Network)?<\/div><input type='hidden' name='question_id[]' id='qID_46' value='366360' \/><input type='hidden' id='answerType366360' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366360[]' id='answer-id-1427523' class='answer   answerof-366360 ' value='1427523'   \/><label for='answer-id-1427523' id='answer-label-1427523' class=' answer'><span>To encrypt email communications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366360[]' id='answer-id-1427524' class='answer   answerof-366360 ' value='1427524'   \/><label for='answer-id-1427524' id='answer-label-1427524' class=' answer'><span>To secure wireless network connections<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366360[]' id='answer-id-1427525' class='answer   answerof-366360 ' value='1427525'   \/><label for='answer-id-1427525' id='answer-label-1427525' class=' answer'><span>To establish a secure remote connection over a public network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366360[]' id='answer-id-1427526' class='answer   answerof-366360 ' value='1427526'   \/><label for='answer-id-1427526' id='answer-label-1427526' class=' answer'><span>To protect against malware attacks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-366361'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>Which of the following involves dividing a network into smaller, more manageable segments?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='366361' \/><input type='hidden' id='answerType366361' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366361[]' id='answer-id-1427527' class='answer   answerof-366361 ' value='1427527'   \/><label for='answer-id-1427527' id='answer-label-1427527' class=' answer'><span>DHCP configuration<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366361[]' id='answer-id-1427528' class='answer   answerof-366361 ' value='1427528'   \/><label for='answer-id-1427528' id='answer-label-1427528' class=' answer'><span>IP addressing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366361[]' id='answer-id-1427529' class='answer   answerof-366361 ' value='1427529'   \/><label for='answer-id-1427529' id='answer-label-1427529' class=' answer'><span>VLAN configuration<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366361[]' id='answer-id-1427530' class='answer   answerof-366361 ' value='1427530'   \/><label for='answer-id-1427530' id='answer-label-1427530' class=' answer'><span>Subnetting<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-366362'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>Which of the following is a unique identifier assigned to a network interface card (NIC)?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='366362' \/><input type='hidden' id='answerType366362' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366362[]' id='answer-id-1427531' class='answer   answerof-366362 ' value='1427531'   \/><label for='answer-id-1427531' id='answer-label-1427531' class=' answer'><span>IP address<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366362[]' id='answer-id-1427532' class='answer   answerof-366362 ' value='1427532'   \/><label for='answer-id-1427532' id='answer-label-1427532' class=' answer'><span>Default gateway<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366362[]' id='answer-id-1427533' class='answer   answerof-366362 ' value='1427533'   \/><label for='answer-id-1427533' id='answer-label-1427533' class=' answer'><span>MAC address<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366362[]' id='answer-id-1427534' class='answer   answerof-366362 ' value='1427534'   \/><label for='answer-id-1427534' id='answer-label-1427534' class=' answer'><span>Subnet mask<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-366363'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>Which protocol is used for communication between web browsers and web servers?<\/div><input type='hidden' name='question_id[]' id='qID_49' value='366363' \/><input type='hidden' id='answerType366363' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366363[]' id='answer-id-1427535' class='answer   answerof-366363 ' value='1427535'   \/><label for='answer-id-1427535' id='answer-label-1427535' class=' answer'><span>ICMP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366363[]' id='answer-id-1427536' class='answer   answerof-366363 ' value='1427536'   \/><label for='answer-id-1427536' id='answer-label-1427536' class=' answer'><span>TCP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366363[]' id='answer-id-1427537' class='answer   answerof-366363 ' value='1427537'   \/><label for='answer-id-1427537' id='answer-label-1427537' class=' answer'><span>UDP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366363[]' id='answer-id-1427538' class='answer   answerof-366363 ' value='1427538'   \/><label for='answer-id-1427538' id='answer-label-1427538' class=' answer'><span>HTTP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-366364'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>What is spear phishing?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='366364' \/><input type='hidden' id='answerType366364' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366364[]' id='answer-id-1427539' class='answer   answerof-366364 ' value='1427539'   \/><label for='answer-id-1427539' id='answer-label-1427539' class=' answer'><span>A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366364[]' id='answer-id-1427540' class='answer   answerof-366364 ' value='1427540'   \/><label for='answer-id-1427540' id='answer-label-1427540' class=' answer'><span>A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366364[]' id='answer-id-1427541' class='answer   answerof-366364 ' value='1427541'   \/><label for='answer-id-1427541' id='answer-label-1427541' class=' answer'><span>A cyber attack where an attacker manipulates and deceives an individual to reveal sensitive information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366364[]' id='answer-id-1427542' class='answer   answerof-366364 ' value='1427542'   \/><label for='answer-id-1427542' id='answer-label-1427542' class=' answer'><span>A type of phishing attack that targets specific individuals or organizations.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-366365'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>What is the purpose of encryption in network security?<\/div><input type='hidden' name='question_id[]' id='qID_51' value='366365' \/><input type='hidden' id='answerType366365' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366365[]' id='answer-id-1427543' class='answer   answerof-366365 ' value='1427543'   \/><label for='answer-id-1427543' id='answer-label-1427543' class=' answer'><span>To monitor and detect network attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366365[]' id='answer-id-1427544' class='answer   answerof-366365 ' value='1427544'   \/><label for='answer-id-1427544' id='answer-label-1427544' class=' answer'><span>To authenticate and authorize users<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366365[]' id='answer-id-1427545' class='answer   answerof-366365 ' value='1427545'   \/><label for='answer-id-1427545' id='answer-label-1427545' class=' answer'><span>To protect the confidentiality and integrity of data during transmission<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366365[]' id='answer-id-1427546' class='answer   answerof-366365 ' value='1427546'   \/><label for='answer-id-1427546' id='answer-label-1427546' class=' answer'><span>To prevent unauthorized physical access to network devices<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-366366'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>Which cryptographic technique is used to ensure the integrity of data without the ability to reverse the process?<\/div><input type='hidden' name='question_id[]' id='qID_52' value='366366' \/><input type='hidden' id='answerType366366' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366366[]' id='answer-id-1427547' class='answer   answerof-366366 ' value='1427547'   \/><label for='answer-id-1427547' id='answer-label-1427547' class=' answer'><span>Hashing algorithm<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366366[]' id='answer-id-1427548' class='answer   answerof-366366 ' value='1427548'   \/><label for='answer-id-1427548' id='answer-label-1427548' class=' answer'><span>Digital signature<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366366[]' id='answer-id-1427549' class='answer   answerof-366366 ' value='1427549'   \/><label for='answer-id-1427549' id='answer-label-1427549' class=' answer'><span>Asymmetric encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366366[]' id='answer-id-1427550' class='answer   answerof-366366 ' value='1427550'   \/><label for='answer-id-1427550' id='answer-label-1427550' class=' answer'><span>Symmetric encryption<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-366367'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>What type of security technique involves setting up a decoy system or network to lure and trap potential attackers?<\/div><input type='hidden' name='question_id[]' id='qID_53' value='366367' \/><input type='hidden' id='answerType366367' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366367[]' id='answer-id-1427551' class='answer   answerof-366367 ' value='1427551'   \/><label for='answer-id-1427551' id='answer-label-1427551' class=' answer'><span>Honeypot<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366367[]' id='answer-id-1427552' class='answer   answerof-366367 ' value='1427552'   \/><label for='answer-id-1427552' id='answer-label-1427552' class=' answer'><span>Virtualization<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366367[]' id='answer-id-1427553' class='answer   answerof-366367 ' value='1427553'   \/><label for='answer-id-1427553' id='answer-label-1427553' class=' answer'><span>DMZ<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366367[]' id='answer-id-1427554' class='answer   answerof-366367 ' value='1427554'   \/><label for='answer-id-1427554' id='answer-label-1427554' class=' answer'><span>Proxy<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-366368'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>Which of the following is an example of a web application vulnerability that can be exploited by an attacker?<\/div><input type='hidden' name='question_id[]' id='qID_54' value='366368' \/><input type='hidden' id='answerType366368' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366368[]' id='answer-id-1427555' class='answer   answerof-366368 ' value='1427555'   \/><label for='answer-id-1427555' id='answer-label-1427555' class=' answer'><span>Network latency<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366368[]' id='answer-id-1427556' class='answer   answerof-366368 ' value='1427556'   \/><label for='answer-id-1427556' id='answer-label-1427556' class=' answer'><span>Disk fragmentation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366368[]' id='answer-id-1427557' class='answer   answerof-366368 ' value='1427557'   \/><label for='answer-id-1427557' id='answer-label-1427557' class=' answer'><span>Buffer overflow<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366368[]' id='answer-id-1427558' class='answer   answerof-366368 ' value='1427558'   \/><label for='answer-id-1427558' id='answer-label-1427558' class=' answer'><span>Cross-site scripting (XSS)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-366369'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>What is encryption?<\/div><input type='hidden' name='question_id[]' id='qID_55' value='366369' \/><input type='hidden' id='answerType366369' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366369[]' id='answer-id-1427559' class='answer   answerof-366369 ' value='1427559'   \/><label for='answer-id-1427559' id='answer-label-1427559' class=' answer'><span>A process of converting plaintext into binary code to enhance data accessibility<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366369[]' id='answer-id-1427560' class='answer   answerof-366369 ' value='1427560'   \/><label for='answer-id-1427560' id='answer-label-1427560' class=' answer'><span>A process of converting binary code into plaintext to improve data reliability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366369[]' id='answer-id-1427561' class='answer   answerof-366369 ' value='1427561'   \/><label for='answer-id-1427561' id='answer-label-1427561' class=' answer'><span>A process of converting plaintext into ciphertext to protect data confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366369[]' id='answer-id-1427562' class='answer   answerof-366369 ' value='1427562'   \/><label for='answer-id-1427562' id='answer-label-1427562' class=' answer'><span>A process of converting ciphertext into plaintext to secure data integrity<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-56' style=';'><div id='questionWrap-56'  class='   watupro-question-id-366370'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>56. <\/span>Which of the following is NOT a component of AAA?<\/div><input type='hidden' name='question_id[]' id='qID_56' value='366370' \/><input type='hidden' id='answerType366370' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366370[]' id='answer-id-1427563' class='answer   answerof-366370 ' value='1427563'   \/><label for='answer-id-1427563' id='answer-label-1427563' class=' answer'><span>Authorization<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366370[]' id='answer-id-1427564' class='answer   answerof-366370 ' value='1427564'   \/><label for='answer-id-1427564' id='answer-label-1427564' class=' answer'><span>Accountability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366370[]' id='answer-id-1427565' class='answer   answerof-366370 ' value='1427565'   \/><label for='answer-id-1427565' id='answer-label-1427565' class=' answer'><span>Authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366370[]' id='answer-id-1427566' class='answer   answerof-366370 ' value='1427566'   \/><label for='answer-id-1427566' id='answer-label-1427566' class=' answer'><span>Accurate accounting<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-57' style=';'><div id='questionWrap-57'  class='   watupro-question-id-366371'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>57. <\/span>What is the purpose of implementing a firewall in a network?<\/div><input type='hidden' name='question_id[]' id='qID_57' value='366371' \/><input type='hidden' id='answerType366371' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366371[]' id='answer-id-1427567' class='answer   answerof-366371 ' value='1427567'   \/><label for='answer-id-1427567' id='answer-label-1427567' class=' answer'><span>To scan and remove malware from network traffic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366371[]' id='answer-id-1427568' class='answer   answerof-366371 ' value='1427568'   \/><label for='answer-id-1427568' id='answer-label-1427568' class=' answer'><span>To prevent unauthorized physical access to network devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366371[]' id='answer-id-1427569' class='answer   answerof-366371 ' value='1427569'   \/><label for='answer-id-1427569' id='answer-label-1427569' class=' answer'><span>To control and filter network traffic based on predetermined security policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366371[]' id='answer-id-1427570' class='answer   answerof-366371 ' value='1427570'   \/><label for='answer-id-1427570' id='answer-label-1427570' class=' answer'><span>To monitor network performance and troubleshoot issues<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-58' style=';'><div id='questionWrap-58'  class='   watupro-question-id-366372'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>58. <\/span>Which statement accurately describes the concept of a code of ethics in the cybersecurity field?<\/div><input type='hidden' name='question_id[]' id='qID_58' value='366372' \/><input type='hidden' id='answerType366372' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366372[]' id='answer-id-1427571' class='answer   answerof-366372 ' value='1427571'   \/><label for='answer-id-1427571' id='answer-label-1427571' class=' answer'><span>A document that articulates ethical standards for cybersecurity professionals.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366372[]' id='answer-id-1427572' class='answer   answerof-366372 ' value='1427572'   \/><label for='answer-id-1427572' id='answer-label-1427572' class=' answer'><span>A set of laws and regulations governing cybersecurity practices.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366372[]' id='answer-id-1427573' class='answer   answerof-366372 ' value='1427573'   \/><label for='answer-id-1427573' id='answer-label-1427573' class=' answer'><span>A framework outlining the steps of a cybersecurity attack.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366372[]' id='answer-id-1427574' class='answer   answerof-366372 ' value='1427574'   \/><label for='answer-id-1427574' id='answer-label-1427574' class=' answer'><span>A compilation of open-source tools for network security.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-59' style=';'><div id='questionWrap-59'  class='   watupro-question-id-366373'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>59. <\/span>Which notation is used by IPv6?<\/div><input type='hidden' name='question_id[]' id='qID_59' value='366373' \/><input type='hidden' id='answerType366373' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366373[]' id='answer-id-1427575' class='answer   answerof-366373 ' value='1427575'   \/><label for='answer-id-1427575' id='answer-label-1427575' class=' answer'><span>Decimal notation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366373[]' id='answer-id-1427576' class='answer   answerof-366373 ' value='1427576'   \/><label for='answer-id-1427576' id='answer-label-1427576' class=' answer'><span>Octal notation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366373[]' id='answer-id-1427577' class='answer   answerof-366373 ' value='1427577'   \/><label for='answer-id-1427577' id='answer-label-1427577' class=' answer'><span>Hexadecimal notation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366373[]' id='answer-id-1427578' class='answer   answerof-366373 ' value='1427578'   \/><label for='answer-id-1427578' id='answer-label-1427578' class=' answer'><span>Binary notation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-60' style=';'><div id='questionWrap-60'  class='   watupro-question-id-366374'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>60. <\/span>What are botnets?<\/div><input type='hidden' name='question_id[]' id='qID_60' value='366374' \/><input type='hidden' id='answerType366374' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366374[]' id='answer-id-1427579' class='answer   answerof-366374 ' value='1427579'   \/><label for='answer-id-1427579' id='answer-label-1427579' class=' answer'><span>An attack that manipulates individuals into revealing sensitive information or performing certain actions.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366374[]' id='answer-id-1427580' class='answer   answerof-366374 ' value='1427580'   \/><label for='answer-id-1427580' id='answer-label-1427580' class=' answer'><span>A network of compromised computers controlled by a central entity to carry out malicious activities.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366374[]' id='answer-id-1427581' class='answer   answerof-366374 ' value='1427581'   \/><label for='answer-id-1427581' id='answer-label-1427581' class=' answer'><span>A form of cyber attack that attempts to gain unauthorized access to a network.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366374[]' id='answer-id-1427582' class='answer   answerof-366374 ' value='1427582'   \/><label for='answer-id-1427582' id='answer-label-1427582' class=' answer'><span>A software program that is designed to damage, disrupt, or gain unauthorized access to a computer \r\nsystem.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-61' style=';'><div id='questionWrap-61'  class='   watupro-question-id-366375'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>61. <\/span>Which of the following is an example of a private IP address?<\/div><input type='hidden' name='question_id[]' id='qID_61' value='366375' \/><input type='hidden' id='answerType366375' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366375[]' id='answer-id-1427583' class='answer   answerof-366375 ' value='1427583'   \/><label for='answer-id-1427583' id='answer-label-1427583' class=' answer'><span>169.254.0.1<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366375[]' id='answer-id-1427584' class='answer   answerof-366375 ' value='1427584'   \/><label for='answer-id-1427584' id='answer-label-1427584' class=' answer'><span>203.0.113.0<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366375[]' id='answer-id-1427585' class='answer   answerof-366375 ' value='1427585'   \/><label for='answer-id-1427585' id='answer-label-1427585' class=' answer'><span>172.16.0.0<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366375[]' id='answer-id-1427586' class='answer   answerof-366375 ' value='1427586'   \/><label for='answer-id-1427586' id='answer-label-1427586' class=' answer'><span>198.51.100.0<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-62' style=';'><div id='questionWrap-62'  class='   watupro-question-id-366376'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>62. <\/span>Which of the following is a common security control measure used to protect applications from unauthorized access?<\/div><input type='hidden' name='question_id[]' id='qID_62' value='366376' \/><input type='hidden' id='answerType366376' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366376[]' id='answer-id-1427587' class='answer   answerof-366376 ' value='1427587'   \/><label for='answer-id-1427587' id='answer-label-1427587' class=' answer'><span>File compression<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366376[]' id='answer-id-1427588' class='answer   answerof-366376 ' value='1427588'   \/><label for='answer-id-1427588' id='answer-label-1427588' class=' answer'><span>Biometric authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366376[]' id='answer-id-1427589' class='answer   answerof-366376 ' value='1427589'   \/><label for='answer-id-1427589' id='answer-label-1427589' class=' answer'><span>Hard disk formatting<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366376[]' id='answer-id-1427590' class='answer   answerof-366376 ' value='1427590'   \/><label for='answer-id-1427590' id='answer-label-1427590' class=' answer'><span>Data anonymization<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-63' style=';'><div id='questionWrap-63'  class='   watupro-question-id-366377'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>63. <\/span>Which of the following is a common authentication protocol used in wireless networks?<\/div><input type='hidden' name='question_id[]' id='qID_63' value='366377' \/><input type='hidden' id='answerType366377' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366377[]' id='answer-id-1427591' class='answer   answerof-366377 ' value='1427591'   \/><label for='answer-id-1427591' id='answer-label-1427591' class=' answer'><span>FTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366377[]' id='answer-id-1427592' class='answer   answerof-366377 ' value='1427592'   \/><label for='answer-id-1427592' id='answer-label-1427592' class=' answer'><span>WPA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366377[]' id='answer-id-1427593' class='answer   answerof-366377 ' value='1427593'   \/><label for='answer-id-1427593' id='answer-label-1427593' class=' answer'><span>SSH<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366377[]' id='answer-id-1427594' class='answer   answerof-366377 ' value='1427594'   \/><label for='answer-id-1427594' id='answer-label-1427594' class=' answer'><span>SMTP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-64' style=';'><div id='questionWrap-64'  class='   watupro-question-id-366378'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>64. <\/span>Which encryption method provides the highest level of security for a wireless SoHo network?<\/div><input type='hidden' name='question_id[]' id='qID_64' value='366378' \/><input type='hidden' id='answerType366378' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366378[]' id='answer-id-1427595' class='answer   answerof-366378 ' value='1427595'   \/><label for='answer-id-1427595' id='answer-label-1427595' class=' answer'><span>WPA2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366378[]' id='answer-id-1427596' class='answer   answerof-366378 ' value='1427596'   \/><label for='answer-id-1427596' id='answer-label-1427596' class=' answer'><span>WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366378[]' id='answer-id-1427597' class='answer   answerof-366378 ' value='1427597'   \/><label for='answer-id-1427597' id='answer-label-1427597' class=' answer'><span>WPA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366378[]' id='answer-id-1427598' class='answer   answerof-366378 ' value='1427598'   \/><label for='answer-id-1427598' id='answer-label-1427598' class=' answer'><span>TKIP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-65' style=';'><div id='questionWrap-65'  class='   watupro-question-id-366379'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>65. <\/span>What is a digital certificate used for in the context of cybersecurity?<\/div><input type='hidden' name='question_id[]' id='qID_65' value='366379' \/><input type='hidden' id='answerType366379' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366379[]' id='answer-id-1427599' class='answer   answerof-366379 ' value='1427599'   \/><label for='answer-id-1427599' id='answer-label-1427599' class=' answer'><span>Encrypting data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366379[]' id='answer-id-1427600' class='answer   answerof-366379 ' value='1427600'   \/><label for='answer-id-1427600' id='answer-label-1427600' class=' answer'><span>Verifying the identity of an entity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366379[]' id='answer-id-1427601' class='answer   answerof-366379 ' value='1427601'   \/><label for='answer-id-1427601' id='answer-label-1427601' class=' answer'><span>Creating a secure tunnel<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366379[]' id='answer-id-1427602' class='answer   answerof-366379 ' value='1427602'   \/><label for='answer-id-1427602' id='answer-label-1427602' class=' answer'><span>Decrypting data<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-66' style=';'><div id='questionWrap-66'  class='   watupro-question-id-366380'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>66. <\/span>Which of the following access control methods is the most secure?<\/div><input type='hidden' name='question_id[]' id='qID_66' value='366380' \/><input type='hidden' id='answerType366380' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366380[]' id='answer-id-1427603' class='answer   answerof-366380 ' value='1427603'   \/><label for='answer-id-1427603' id='answer-label-1427603' class=' answer'><span>Biometric authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366380[]' id='answer-id-1427604' class='answer   answerof-366380 ' value='1427604'   \/><label for='answer-id-1427604' id='answer-label-1427604' class=' answer'><span>Multi-factor authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366380[]' id='answer-id-1427605' class='answer   answerof-366380 ' value='1427605'   \/><label for='answer-id-1427605' id='answer-label-1427605' class=' answer'><span>Single-factor authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366380[]' id='answer-id-1427606' class='answer   answerof-366380 ' value='1427606'   \/><label for='answer-id-1427606' id='answer-label-1427606' class=' answer'><span>Password-based authentication<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-67' style=';'><div id='questionWrap-67'  class='   watupro-question-id-366381'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>67. <\/span>Which of the following is a common threat to cybersecurity?<\/div><input type='hidden' name='question_id[]' id='qID_67' value='366381' \/><input type='hidden' id='answerType366381' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366381[]' id='answer-id-1427607' class='answer   answerof-366381 ' value='1427607'   \/><label for='answer-id-1427607' id='answer-label-1427607' class=' answer'><span>Software updates<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366381[]' id='answer-id-1427608' class='answer   answerof-366381 ' value='1427608'   \/><label for='answer-id-1427608' id='answer-label-1427608' class=' answer'><span>Data encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366381[]' id='answer-id-1427609' class='answer   answerof-366381 ' value='1427609'   \/><label for='answer-id-1427609' id='answer-label-1427609' class=' answer'><span>User authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366381[]' id='answer-id-1427610' class='answer   answerof-366381 ' value='1427610'   \/><label for='answer-id-1427610' id='answer-label-1427610' class=' answer'><span>Phishing attacks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-68' style=';'><div id='questionWrap-68'  class='   watupro-question-id-366382'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>68. <\/span>Which protocol is used to assign IP addresses to devices on a network?<\/div><input type='hidden' name='question_id[]' id='qID_68' value='366382' \/><input type='hidden' id='answerType366382' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366382[]' id='answer-id-1427611' class='answer   answerof-366382 ' value='1427611'   \/><label for='answer-id-1427611' id='answer-label-1427611' class=' answer'><span>ICMP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366382[]' id='answer-id-1427612' class='answer   answerof-366382 ' value='1427612'   \/><label for='answer-id-1427612' id='answer-label-1427612' class=' answer'><span>DHCP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366382[]' id='answer-id-1427613' class='answer   answerof-366382 ' value='1427613'   \/><label for='answer-id-1427613' id='answer-label-1427613' class=' answer'><span>UDP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366382[]' id='answer-id-1427614' class='answer   answerof-366382 ' value='1427614'   \/><label for='answer-id-1427614' id='answer-label-1427614' class=' answer'><span>TCP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-69' style=';'><div id='questionWrap-69'  class='   watupro-question-id-366383'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>69. <\/span>Which technology is responsible for managing cryptographic keys, digital certificates, and providing other security-related services?<\/div><input type='hidden' name='question_id[]' id='qID_69' value='366383' \/><input type='hidden' id='answerType366383' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366383[]' id='answer-id-1427615' class='answer   answerof-366383 ' value='1427615'   \/><label for='answer-id-1427615' id='answer-label-1427615' class=' answer'><span>Intrusion Detection System (IDS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366383[]' id='answer-id-1427616' class='answer   answerof-366383 ' value='1427616'   \/><label for='answer-id-1427616' id='answer-label-1427616' class=' answer'><span>Virtual Private Network (VPN)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366383[]' id='answer-id-1427617' class='answer   answerof-366383 ' value='1427617'   \/><label for='answer-id-1427617' id='answer-label-1427617' class=' answer'><span>Public Key Infrastructure (PKI)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366383[]' id='answer-id-1427618' class='answer   answerof-366383 ' value='1427618'   \/><label for='answer-id-1427618' id='answer-label-1427618' class=' answer'><span>Firewall<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-70' style=';'><div id='questionWrap-70'  class='   watupro-question-id-366384'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>70. <\/span>What is a denial of service (DoS) attack?<\/div><input type='hidden' name='question_id[]' id='qID_70' value='366384' \/><input type='hidden' id='answerType366384' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366384[]' id='answer-id-1427619' class='answer   answerof-366384 ' value='1427619'   \/><label for='answer-id-1427619' id='answer-label-1427619' class=' answer'><span>A technique used by attackers to obtain sensitive information through deception.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366384[]' id='answer-id-1427620' class='answer   answerof-366384 ' value='1427620'   \/><label for='answer-id-1427620' id='answer-label-1427620' class=' answer'><span>A software program that is designed to damage, disrupt, or gain unauthorized access to a computer \r\nsystem.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366384[]' id='answer-id-1427621' class='answer   answerof-366384 ' value='1427621'   \/><label for='answer-id-1427621' id='answer-label-1427621' class=' answer'><span>A form of cyber attack that attempts to gain unauthorized access to a network.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366384[]' id='answer-id-1427622' class='answer   answerof-366384 ' value='1427622'   \/><label for='answer-id-1427622' id='answer-label-1427622' class=' answer'><span>An attack that overwhelms a target system with a flood of traffic or requests, rendering it inaccessible to legitimate users.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-71' style=';'><div id='questionWrap-71'  class='   watupro-question-id-366385'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>71. <\/span>Which of the following features help to secure a wireless SoHo network from unauthorized access?<\/div><input type='hidden' name='question_id[]' id='qID_71' value='366385' \/><input type='hidden' id='answerType366385' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366385[]' id='answer-id-1427623' class='answer   answerof-366385 ' value='1427623'   \/><label for='answer-id-1427623' id='answer-label-1427623' class=' answer'><span>Default admin credentials<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366385[]' id='answer-id-1427624' class='answer   answerof-366385 ' value='1427624'   \/><label for='answer-id-1427624' id='answer-label-1427624' class=' answer'><span>Weak encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366385[]' id='answer-id-1427625' class='answer   answerof-366385 ' value='1427625'   \/><label for='answer-id-1427625' id='answer-label-1427625' class=' answer'><span>MAC filtering<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366385[]' id='answer-id-1427626' class='answer   answerof-366385 ' value='1427626'   \/><label for='answer-id-1427626' id='answer-label-1427626' class=' answer'><span>SSID broadcast<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-72' style=';'><div id='questionWrap-72'  class='   watupro-question-id-366386'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>72. <\/span>What is the primary function of a server in a network infrastructure?<\/div><input type='hidden' name='question_id[]' id='qID_72' value='366386' \/><input type='hidden' id='answerType366386' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366386[]' id='answer-id-1427627' class='answer   answerof-366386 ' value='1427627'   \/><label for='answer-id-1427627' id='answer-label-1427627' class=' answer'><span>Monitor network traffic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366386[]' id='answer-id-1427628' class='answer   answerof-366386 ' value='1427628'   \/><label for='answer-id-1427628' id='answer-label-1427628' class=' answer'><span>Filter incoming and outgoing traffic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366386[]' id='answer-id-1427629' class='answer   answerof-366386 ' value='1427629'   \/><label for='answer-id-1427629' id='answer-label-1427629' class=' answer'><span>Detect and prevent intrusions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366386[]' id='answer-id-1427630' class='answer   answerof-366386 ' value='1427630'   \/><label for='answer-id-1427630' id='answer-label-1427630' class=' answer'><span>Store and manage files<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-73' style=';'><div id='questionWrap-73'  class='   watupro-question-id-366387'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>73. <\/span>Which encryption method uses a single key to both encrypt and decrypt data?<\/div><input type='hidden' name='question_id[]' id='qID_73' value='366387' \/><input type='hidden' id='answerType366387' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366387[]' id='answer-id-1427631' class='answer   answerof-366387 ' value='1427631'   \/><label for='answer-id-1427631' id='answer-label-1427631' class=' answer'><span>SSL\/TLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366387[]' id='answer-id-1427632' class='answer   answerof-366387 ' value='1427632'   \/><label for='answer-id-1427632' id='answer-label-1427632' class=' answer'><span>Symmetric encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366387[]' id='answer-id-1427633' class='answer   answerof-366387 ' value='1427633'   \/><label for='answer-id-1427633' id='answer-label-1427633' class=' answer'><span>Hashing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366387[]' id='answer-id-1427634' class='answer   answerof-366387 ' value='1427634'   \/><label for='answer-id-1427634' id='answer-label-1427634' class=' answer'><span>Asymmetric encryption<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-74' style=';'><div id='questionWrap-74'  class='   watupro-question-id-366388'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>74. <\/span>What is an attack vector in cybersecurity?<\/div><input type='hidden' name='question_id[]' id='qID_74' value='366388' \/><input type='hidden' id='answerType366388' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366388[]' id='answer-id-1427635' class='answer   answerof-366388 ' value='1427635'   \/><label for='answer-id-1427635' id='answer-label-1427635' class=' answer'><span>The method used by an attacker to gain unauthorized access<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366388[]' id='answer-id-1427636' class='answer   answerof-366388 ' value='1427636'   \/><label for='answer-id-1427636' id='answer-label-1427636' class=' answer'><span>A vulnerability in a system that can be exploited<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366388[]' id='answer-id-1427637' class='answer   answerof-366388 ' value='1427637'   \/><label for='answer-id-1427637' id='answer-label-1427637' class=' answer'><span>The path or means through which an attacker can exploit vulnerabilities<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366388[]' id='answer-id-1427638' class='answer   answerof-366388 ' value='1427638'   \/><label for='answer-id-1427638' id='answer-label-1427638' class=' answer'><span>The likelihood of a cyber attack taking place<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-75' style=';'><div id='questionWrap-75'  class='   watupro-question-id-366389'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>75. <\/span>Which of the following is an example of a network vulnerability?<\/div><input type='hidden' name='question_id[]' id='qID_75' value='366389' \/><input type='hidden' id='answerType366389' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366389[]' id='answer-id-1427639' class='answer   answerof-366389 ' value='1427639'   \/><label for='answer-id-1427639' id='answer-label-1427639' class=' answer'><span>Encrypting sensitive data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366389[]' id='answer-id-1427640' class='answer   answerof-366389 ' value='1427640'   \/><label for='answer-id-1427640' id='answer-label-1427640' class=' answer'><span>Running outdated and unpatched software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366389[]' id='answer-id-1427641' class='answer   answerof-366389 ' value='1427641'   \/><label for='answer-id-1427641' id='answer-label-1427641' class=' answer'><span>Using a strong password<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366389[]' id='answer-id-1427642' class='answer   answerof-366389 ' value='1427642'   \/><label for='answer-id-1427642' id='answer-label-1427642' class=' answer'><span>Implementing a firewall<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-76' style=';'><div id='questionWrap-76'  class='   watupro-question-id-366390'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>76. <\/span>Which of the following is NOT an essential security principle?<\/div><input type='hidden' name='question_id[]' id='qID_76' value='366390' \/><input type='hidden' id='answerType366390' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366390[]' id='answer-id-1427643' class='answer   answerof-366390 ' value='1427643'   \/><label for='answer-id-1427643' id='answer-label-1427643' class=' answer'><span>Complexity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366390[]' id='answer-id-1427644' class='answer   answerof-366390 ' value='1427644'   \/><label for='answer-id-1427644' id='answer-label-1427644' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366390[]' id='answer-id-1427645' class='answer   answerof-366390 ' value='1427645'   \/><label for='answer-id-1427645' id='answer-label-1427645' class=' answer'><span>Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366390[]' id='answer-id-1427646' class='answer   answerof-366390 ' value='1427646'   \/><label for='answer-id-1427646' id='answer-label-1427646' class=' answer'><span>Integrity<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-77' style=';'><div id='questionWrap-77'  class='   watupro-question-id-366391'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>77. <\/span>Which technology is responsible for monitoring network traffic and identifying potential threats?<\/div><input type='hidden' name='question_id[]' id='qID_77' value='366391' \/><input type='hidden' id='answerType366391' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366391[]' id='answer-id-1427647' class='answer   answerof-366391 ' value='1427647'   \/><label for='answer-id-1427647' id='answer-label-1427647' class=' answer'><span>IDS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366391[]' id='answer-id-1427648' class='answer   answerof-366391 ' value='1427648'   \/><label for='answer-id-1427648' id='answer-label-1427648' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366391[]' id='answer-id-1427649' class='answer   answerof-366391 ' value='1427649'   \/><label for='answer-id-1427649' id='answer-label-1427649' class=' answer'><span>Server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366391[]' id='answer-id-1427650' class='answer   answerof-366391 ' value='1427650'   \/><label for='answer-id-1427650' id='answer-label-1427650' class=' answer'><span>IPS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-78' style=';'><div id='questionWrap-78'  class='   watupro-question-id-366392'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>78. <\/span>Which of the following best describes the concept of defense in depth in cybersecurity?<\/div><input type='hidden' name='question_id[]' id='qID_78' value='366392' \/><input type='hidden' id='answerType366392' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366392[]' id='answer-id-1427651' class='answer   answerof-366392 ' value='1427651'   \/><label for='answer-id-1427651' id='answer-label-1427651' class=' answer'><span>Utilizing multiple layers of security controls to protect against different types of threats<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366392[]' id='answer-id-1427652' class='answer   answerof-366392 ' value='1427652'   \/><label for='answer-id-1427652' id='answer-label-1427652' class=' answer'><span>Running regular vulnerability scans to maintain the integrity of the system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366392[]' id='answer-id-1427653' class='answer   answerof-366392 ' value='1427653'   \/><label for='answer-id-1427653' id='answer-label-1427653' class=' answer'><span>Implementing access controls to ensure availability of critical resources<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366392[]' id='answer-id-1427654' class='answer   answerof-366392 ' value='1427654'   \/><label for='answer-id-1427654' id='answer-label-1427654' class=' answer'><span>Encrypting sensitive data to maintain confidentiality<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-79' style=';'><div id='questionWrap-79'  class='   watupro-question-id-366393'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>79. <\/span>What is the general motivation behind an Advanced Persistent Threat (APT)?<\/div><input type='hidden' name='question_id[]' id='qID_79' value='366393' \/><input type='hidden' id='answerType366393' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366393[]' id='answer-id-1427655' class='answer   answerof-366393 ' value='1427655'   \/><label for='answer-id-1427655' id='answer-label-1427655' class=' answer'><span>Publicity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366393[]' id='answer-id-1427656' class='answer   answerof-366393 ' value='1427656'   \/><label for='answer-id-1427656' id='answer-label-1427656' class=' answer'><span>Random disruption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366393[]' id='answer-id-1427657' class='answer   answerof-366393 ' value='1427657'   \/><label for='answer-id-1427657' id='answer-label-1427657' class=' answer'><span>Financial gain<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366393[]' id='answer-id-1427658' class='answer   answerof-366393 ' value='1427658'   \/><label for='answer-id-1427658' id='answer-label-1427658' class=' answer'><span>Revenge<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-80' style=';'><div id='questionWrap-80'  class='   watupro-question-id-366394'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>80. <\/span>What is a vulnerability in the context of cybersecurity?<\/div><input type='hidden' name='question_id[]' id='qID_80' value='366394' \/><input type='hidden' id='answerType366394' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366394[]' id='answer-id-1427659' class='answer   answerof-366394 ' value='1427659'   \/><label for='answer-id-1427659' id='answer-label-1427659' class=' answer'><span>An advanced encryption algorithm<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366394[]' id='answer-id-1427660' class='answer   answerof-366394 ' value='1427660'   \/><label for='answer-id-1427660' id='answer-label-1427660' class=' answer'><span>A software bug that causes system crashes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366394[]' id='answer-id-1427661' class='answer   answerof-366394 ' value='1427661'   \/><label for='answer-id-1427661' id='answer-label-1427661' class=' answer'><span>A weakness in a system that can be exploited by threats<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366394[]' id='answer-id-1427662' class='answer   answerof-366394 ' value='1427662'   \/><label for='answer-id-1427662' id='answer-label-1427662' class=' answer'><span>A security measure that prevents unauthorized access<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-81' style=';'><div id='questionWrap-81'  class='   watupro-question-id-366395'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>81. <\/span>What is an Advanced Persistent Threat (APT)?<\/div><input type='hidden' name='question_id[]' id='qID_81' value='366395' \/><input type='hidden' id='answerType366395' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366395[]' id='answer-id-1427663' class='answer   answerof-366395 ' value='1427663'   \/><label for='answer-id-1427663' id='answer-label-1427663' class=' answer'><span>A vulnerability in network communication protocols.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366395[]' id='answer-id-1427664' class='answer   answerof-366395 ' value='1427664'   \/><label for='answer-id-1427664' id='answer-label-1427664' class=' answer'><span>A cyberattack that compromises multiple devices simultaneously.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366395[]' id='answer-id-1427665' class='answer   answerof-366395 ' value='1427665'   \/><label for='answer-id-1427665' id='answer-label-1427665' class=' answer'><span>A sophisticated and targeted attack that aims to gain unauthorized access and maintain persistence over a long period.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366395[]' id='answer-id-1427666' class='answer   answerof-366395 ' value='1427666'   \/><label for='answer-id-1427666' id='answer-label-1427666' class=' answer'><span>A type of malware that spreads rapidly through a network.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-82' style=';'><div id='questionWrap-82'  class='   watupro-question-id-366396'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>82. <\/span>What is an insider threat?<\/div><input type='hidden' name='question_id[]' id='qID_82' value='366396' \/><input type='hidden' id='answerType366396' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366396[]' id='answer-id-1427667' class='answer   answerof-366396 ' value='1427667'   \/><label for='answer-id-1427667' id='answer-label-1427667' class=' answer'><span>A threat posed by an individual with authorized access to an organization's systems and data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366396[]' id='answer-id-1427668' class='answer   answerof-366396 ' value='1427668'   \/><label for='answer-id-1427668' id='answer-label-1427668' class=' answer'><span>A vulnerability in an organization's network infrastructure.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366396[]' id='answer-id-1427669' class='answer   answerof-366396 ' value='1427669'   \/><label for='answer-id-1427669' id='answer-label-1427669' class=' answer'><span>The accidental disclosure of sensitive information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366396[]' id='answer-id-1427670' class='answer   answerof-366396 ' value='1427670'   \/><label for='answer-id-1427670' id='answer-label-1427670' class=' answer'><span>A security breach caused by an external attacker.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-83' style=';'><div id='questionWrap-83'  class='   watupro-question-id-366397'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>83. <\/span>What is tailgating in the context of cybersecurity?<\/div><input type='hidden' name='question_id[]' id='qID_83' value='366397' \/><input type='hidden' id='answerType366397' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366397[]' id='answer-id-1427671' class='answer   answerof-366397 ' value='1427671'   \/><label for='answer-id-1427671' id='answer-label-1427671' class=' answer'><span>A type of phishing attack that targets specific individuals or organizations.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366397[]' id='answer-id-1427672' class='answer   answerof-366397 ' value='1427672'   \/><label for='answer-id-1427672' id='answer-label-1427672' class=' answer'><span>A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366397[]' id='answer-id-1427673' class='answer   answerof-366397 ' value='1427673'   \/><label for='answer-id-1427673' id='answer-label-1427673' class=' answer'><span>A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366397[]' id='answer-id-1427674' class='answer   answerof-366397 ' value='1427674'   \/><label for='answer-id-1427674' id='answer-label-1427674' class=' answer'><span>A cyber attack where an attacker manipulates and deceives an individual to reveal sensitive \r\ninformation.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-84' style=';'><div id='questionWrap-84'  class='   watupro-question-id-366398'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>84. <\/span>Which protocol uses encryption for secure remote access to network resources?<\/div><input type='hidden' name='question_id[]' id='qID_84' value='366398' \/><input type='hidden' id='answerType366398' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366398[]' id='answer-id-1427675' class='answer   answerof-366398 ' value='1427675'   \/><label for='answer-id-1427675' id='answer-label-1427675' class=' answer'><span>Point-to-Point Protocol (PPP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366398[]' id='answer-id-1427676' class='answer   answerof-366398 ' value='1427676'   \/><label for='answer-id-1427676' id='answer-label-1427676' class=' answer'><span>Wireless Equivalent Privacy (WEP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366398[]' id='answer-id-1427677' class='answer   answerof-366398 ' value='1427677'   \/><label for='answer-id-1427677' id='answer-label-1427677' class=' answer'><span>Internet Protocol Security (IPSec)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366398[]' id='answer-id-1427678' class='answer   answerof-366398 ' value='1427678'   \/><label for='answer-id-1427678' id='answer-label-1427678' class=' answer'><span>Secure Shell (SSH)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-85' style=';'><div id='questionWrap-85'  class='   watupro-question-id-366399'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>85. <\/span>What is the purpose of using an application firewall in a cybersecurity setup?<\/div><input type='hidden' name='question_id[]' id='qID_85' value='366399' \/><input type='hidden' id='answerType366399' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366399[]' id='answer-id-1427679' class='answer   answerof-366399 ' value='1427679'   \/><label for='answer-id-1427679' id='answer-label-1427679' class=' answer'><span>To encrypt network traffic between applications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366399[]' id='answer-id-1427680' class='answer   answerof-366399 ' value='1427680'   \/><label for='answer-id-1427680' id='answer-label-1427680' class=' answer'><span>To perform vulnerability scanning of applications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366399[]' id='answer-id-1427681' class='answer   answerof-366399 ' value='1427681'   \/><label for='answer-id-1427681' id='answer-label-1427681' class=' answer'><span>To increase the speed and performance of applications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366399[]' id='answer-id-1427682' class='answer   answerof-366399 ' value='1427682'   \/><label for='answer-id-1427682' id='answer-label-1427682' class=' answer'><span>To block malicious incoming requests and attacks aimed at the application<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-86' style=';'><div id='questionWrap-86'  class='   watupro-question-id-366400'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>86. <\/span>Which of the following network technologies is commonly used to connect devices within a local area network (LAN)?<\/div><input type='hidden' name='question_id[]' id='qID_86' value='366400' \/><input type='hidden' id='answerType366400' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366400[]' id='answer-id-1427683' class='answer   answerof-366400 ' value='1427683'   \/><label for='answer-id-1427683' id='answer-label-1427683' class=' answer'><span>Wi-Fi<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366400[]' id='answer-id-1427684' class='answer   answerof-366400 ' value='1427684'   \/><label for='answer-id-1427684' id='answer-label-1427684' class=' answer'><span>Ethernet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366400[]' id='answer-id-1427685' class='answer   answerof-366400 ' value='1427685'   \/><label for='answer-id-1427685' id='answer-label-1427685' class=' answer'><span>DSL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366400[]' id='answer-id-1427686' class='answer   answerof-366400 ' value='1427686'   \/><label for='answer-id-1427686' id='answer-label-1427686' class=' answer'><span>VPN<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-87' style=';'><div id='questionWrap-87'  class='   watupro-question-id-366401'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>87. <\/span>Which of the following is a key advantage of multifactor authentication?<\/div><input type='hidden' name='question_id[]' id='qID_87' value='366401' \/><input type='hidden' id='answerType366401' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366401[]' id='answer-id-1427687' class='answer   answerof-366401 ' value='1427687'   \/><label for='answer-id-1427687' id='answer-label-1427687' class=' answer'><span>It allows for anonymous access to systems and resources.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366401[]' id='answer-id-1427688' class='answer   answerof-366401 ' value='1427688'   \/><label for='answer-id-1427688' id='answer-label-1427688' class=' answer'><span>It simplifies the authentication process.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366401[]' id='answer-id-1427689' class='answer   answerof-366401 ' value='1427689'   \/><label for='answer-id-1427689' id='answer-label-1427689' class=' answer'><span>It eliminates the need for strong passwords.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366401[]' id='answer-id-1427690' class='answer   answerof-366401 ' value='1427690'   \/><label for='answer-id-1427690' id='answer-label-1427690' class=' answer'><span>It provides enhanced security by requiring multiple proofs of identity.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-88' style=';'><div id='questionWrap-88'  class='   watupro-question-id-366402'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>88. <\/span>What is the primary characteristic of an Advanced Persistent Threat (APT) compared to traditional attacks?<\/div><input type='hidden' name='question_id[]' id='qID_88' value='366402' \/><input type='hidden' id='answerType366402' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366402[]' id='answer-id-1427691' class='answer   answerof-366402 ' value='1427691'   \/><label for='answer-id-1427691' id='answer-label-1427691' class=' answer'><span>APTs are easily detectable by conventional security measures<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366402[]' id='answer-id-1427692' class='answer   answerof-366402 ' value='1427692'   \/><label for='answer-id-1427692' id='answer-label-1427692' class=' answer'><span>APTs involve persistent and prolonged attacks on specific targets<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366402[]' id='answer-id-1427693' class='answer   answerof-366402 ' value='1427693'   \/><label for='answer-id-1427693' id='answer-label-1427693' class=' answer'><span>APTs are random and indiscriminate in their targets<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366402[]' id='answer-id-1427694' class='answer   answerof-366402 ' value='1427694'   \/><label for='answer-id-1427694' id='answer-label-1427694' class=' answer'><span>APTs are primarily aimed at causing immediate damage to systems<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-89' style=';'><div id='questionWrap-89'  class='   watupro-question-id-366403'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>89. <\/span>What is smishing?<\/div><input type='hidden' name='question_id[]' id='qID_89' value='366403' \/><input type='hidden' id='answerType366403' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366403[]' id='answer-id-1427695' class='answer   answerof-366403 ' value='1427695'   \/><label for='answer-id-1427695' id='answer-label-1427695' class=' answer'><span>A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366403[]' id='answer-id-1427696' class='answer   answerof-366403 ' value='1427696'   \/><label for='answer-id-1427696' id='answer-label-1427696' class=' answer'><span>A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366403[]' id='answer-id-1427697' class='answer   answerof-366403 ' value='1427697'   \/><label for='answer-id-1427697' id='answer-label-1427697' class=' answer'><span>A type of phishing attack that targets specific individuals or organizations.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366403[]' id='answer-id-1427698' class='answer   answerof-366403 ' value='1427698'   \/><label for='answer-id-1427698' id='answer-label-1427698' class=' answer'><span>A cyber attack where an attacker manipulates and deceives an individual to reveal sensitive \r\ninformation.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-90' style=';'><div id='questionWrap-90'  class='   watupro-question-id-366404'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>90. <\/span>Which of the following represents a strong passphrase for securing a wireless SoHo network?<\/div><input type='hidden' name='question_id[]' id='qID_90' value='366404' \/><input type='hidden' id='answerType366404' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366404[]' id='answer-id-1427699' class='answer   answerof-366404 ' value='1427699'   \/><label for='answer-id-1427699' id='answer-label-1427699' class=' answer'><span>12345678<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366404[]' id='answer-id-1427700' class='answer   answerof-366404 ' value='1427700'   \/><label for='answer-id-1427700' id='answer-label-1427700' class=' answer'><span>P@ssword!<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366404[]' id='answer-id-1427701' class='answer   answerof-366404 ' value='1427701'   \/><label for='answer-id-1427701' id='answer-label-1427701' class=' answer'><span>CorrectHorseBatteryStaple<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366404[]' id='answer-id-1427702' class='answer   answerof-366404 ' value='1427702'   \/><label for='answer-id-1427702' id='answer-label-1427702' class=' answer'><span>jumpr0pe<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-91' style=';'><div id='questionWrap-91'  class='   watupro-question-id-366405'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>91. <\/span>Which of the following best describes social engineering?<\/div><input type='hidden' name='question_id[]' id='qID_91' value='366405' \/><input type='hidden' id='answerType366405' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366405[]' id='answer-id-1427703' class='answer   answerof-366405 ' value='1427703'   \/><label for='answer-id-1427703' id='answer-label-1427703' class=' answer'><span>A method of manipulating individuals to disclose sensitive information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366405[]' id='answer-id-1427704' class='answer   answerof-366405 ' value='1427704'   \/><label for='answer-id-1427704' id='answer-label-1427704' class=' answer'><span>A type of malware attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366405[]' id='answer-id-1427705' class='answer   answerof-366405 ' value='1427705'   \/><label for='answer-id-1427705' id='answer-label-1427705' class=' answer'><span>A physical security control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366405[]' id='answer-id-1427706' class='answer   answerof-366405 ' value='1427706'   \/><label for='answer-id-1427706' id='answer-label-1427706' class=' answer'><span>A network security protocol<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-92' style=';'><div id='questionWrap-92'  class='   watupro-question-id-366406'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>92. <\/span>Which of the following is an integral part of the CIA triad in cybersecurity?<\/div><input type='hidden' name='question_id[]' id='qID_92' value='366406' \/><input type='hidden' id='answerType366406' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366406[]' id='answer-id-1427707' class='answer   answerof-366406 ' value='1427707'   \/><label for='answer-id-1427707' id='answer-label-1427707' class=' answer'><span>Data loss prevention (DLP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366406[]' id='answer-id-1427708' class='answer   answerof-366406 ' value='1427708'   \/><label for='answer-id-1427708' id='answer-label-1427708' class=' answer'><span>Two-factor authentication (2FA)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366406[]' id='answer-id-1427709' class='answer   answerof-366406 ' value='1427709'   \/><label for='answer-id-1427709' id='answer-label-1427709' class=' answer'><span>Intrusion Detection System (IDS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366406[]' id='answer-id-1427710' class='answer   answerof-366406 ' value='1427710'   \/><label for='answer-id-1427710' id='answer-label-1427710' class=' answer'><span>Firewall<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-93' style=';'><div id='questionWrap-93'  class='   watupro-question-id-366407'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>93. <\/span>What term refers to the process of creating a virtual version of a device or resource, such as a server or a network?<\/div><input type='hidden' name='question_id[]' id='qID_93' value='366407' \/><input type='hidden' id='answerType366407' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366407[]' id='answer-id-1427711' class='answer   answerof-366407 ' value='1427711'   \/><label for='answer-id-1427711' id='answer-label-1427711' class=' answer'><span>Virtualization<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366407[]' id='answer-id-1427712' class='answer   answerof-366407 ' value='1427712'   \/><label for='answer-id-1427712' id='answer-label-1427712' class=' answer'><span>DMZ<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366407[]' id='answer-id-1427713' class='answer   answerof-366407 ' value='1427713'   \/><label for='answer-id-1427713' id='answer-label-1427713' class=' answer'><span>Cloud<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366407[]' id='answer-id-1427714' class='answer   answerof-366407 ' value='1427714'   \/><label for='answer-id-1427714' id='answer-label-1427714' class=' answer'><span>Proxy<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-94' style=';'><div id='questionWrap-94'  class='   watupro-question-id-366408'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>94. <\/span>Which of the following best describes the concept of data integrity in cybersecurity?<\/div><input type='hidden' name='question_id[]' id='qID_94' value='366408' \/><input type='hidden' id='answerType366408' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366408[]' id='answer-id-1427715' class='answer   answerof-366408 ' value='1427715'   \/><label for='answer-id-1427715' id='answer-label-1427715' class=' answer'><span>Ensuring data is available for authorized users when needed<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366408[]' id='answer-id-1427716' class='answer   answerof-366408 ' value='1427716'   \/><label for='answer-id-1427716' id='answer-label-1427716' class=' answer'><span>Encrypting data to prevent unauthorized modifications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366408[]' id='answer-id-1427717' class='answer   answerof-366408 ' value='1427717'   \/><label for='answer-id-1427717' id='answer-label-1427717' class=' answer'><span>Protecting data from unauthorized access or disclosure<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366408[]' id='answer-id-1427718' class='answer   answerof-366408 ' value='1427718'   \/><label for='answer-id-1427718' id='answer-label-1427718' class=' answer'><span>Ensuring data is accurate, consistent, and trustworthy<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-95' style=';'><div id='questionWrap-95'  class='   watupro-question-id-366409'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>95. <\/span>Which malicious activity is NOT typically associated with cyber attacks?<\/div><input type='hidden' name='question_id[]' id='qID_95' value='366409' \/><input type='hidden' id='answerType366409' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366409[]' id='answer-id-1427719' class='answer   answerof-366409 ' value='1427719'   \/><label for='answer-id-1427719' id='answer-label-1427719' class=' answer'><span>Phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366409[]' id='answer-id-1427720' class='answer   answerof-366409 ' value='1427720'   \/><label for='answer-id-1427720' id='answer-label-1427720' class=' answer'><span>Malware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366409[]' id='answer-id-1427721' class='answer   answerof-366409 ' value='1427721'   \/><label for='answer-id-1427721' id='answer-label-1427721' class=' answer'><span>Data encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366409[]' id='answer-id-1427722' class='answer   answerof-366409 ' value='1427722'   \/><label for='answer-id-1427722' id='answer-label-1427722' class=' answer'><span>Denial of Service (DoS)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-96' style=';'><div id='questionWrap-96'  class='   watupro-question-id-366410'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>96. <\/span>What is a man-in-the-middle attack?<\/div><input type='hidden' name='question_id[]' id='qID_96' value='366410' \/><input type='hidden' id='answerType366410' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366410[]' id='answer-id-1427723' class='answer   answerof-366410 ' value='1427723'   \/><label for='answer-id-1427723' id='answer-label-1427723' class=' answer'><span>An attack that intercepts and manipulates communication between two parties.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366410[]' id='answer-id-1427724' class='answer   answerof-366410 ' value='1427724'   \/><label for='answer-id-1427724' id='answer-label-1427724' class=' answer'><span>An attack that exploits vulnerabilities in a device's software.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366410[]' id='answer-id-1427725' class='answer   answerof-366410 ' value='1427725'   \/><label for='answer-id-1427725' id='answer-label-1427725' class=' answer'><span>An attack that targets Internet of Things devices.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366410[]' id='answer-id-1427726' class='answer   answerof-366410 ' value='1427726'   \/><label for='answer-id-1427726' id='answer-label-1427726' class=' answer'><span>An attack where an insider intentionally releases sensitive information.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-97' style=';'><div id='questionWrap-97'  class='   watupro-question-id-366411'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>97. <\/span>Which of the following best describes an Advanced Persistent Threat (APT)?<\/div><input type='hidden' name='question_id[]' id='qID_97' value='366411' \/><input type='hidden' id='answerType366411' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366411[]' id='answer-id-1427727' class='answer   answerof-366411 ' value='1427727'   \/><label for='answer-id-1427727' id='answer-label-1427727' class=' answer'><span>An unintentional and harmless interaction with a computer system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366411[]' id='answer-id-1427728' class='answer   answerof-366411 ' value='1427728'   \/><label for='answer-id-1427728' id='answer-label-1427728' class=' answer'><span>A security incident caused by human error or negligence<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366411[]' id='answer-id-1427729' class='answer   answerof-366411 ' value='1427729'   \/><label for='answer-id-1427729' id='answer-label-1427729' class=' answer'><span>A targeted cyber attack that aims to gain unauthorized access to sensitive information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366411[]' id='answer-id-1427730' class='answer   answerof-366411 ' value='1427730'   \/><label for='answer-id-1427730' id='answer-label-1427730' class=' answer'><span>A type of malware designed to disrupt computer networks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-98' style=';'><div id='questionWrap-98'  class='   watupro-question-id-366412'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>98. <\/span>Which of the following is an example of multifactor authentication?<\/div><input type='hidden' name='question_id[]' id='qID_98' value='366412' \/><input type='hidden' id='answerType366412' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366412[]' id='answer-id-1427731' class='answer   answerof-366412 ' value='1427731'   \/><label for='answer-id-1427731' id='answer-label-1427731' class=' answer'><span>Using a fingerprint scan only<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366412[]' id='answer-id-1427732' class='answer   answerof-366412 ' value='1427732'   \/><label for='answer-id-1427732' id='answer-label-1427732' class=' answer'><span>Using a biometric scan and a passcode<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366412[]' id='answer-id-1427733' class='answer   answerof-366412 ' value='1427733'   \/><label for='answer-id-1427733' id='answer-label-1427733' class=' answer'><span>Using a username and password only<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366412[]' id='answer-id-1427734' class='answer   answerof-366412 ' value='1427734'   \/><label for='answer-id-1427734' id='answer-label-1427734' class=' answer'><span>Using a smart card and a PIN<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-99' style=';'><div id='questionWrap-99'  class='   watupro-question-id-366413'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>99. <\/span>Which type of encryption protects data while it is being transmitted over a network?<\/div><input type='hidden' name='question_id[]' id='qID_99' value='366413' \/><input type='hidden' id='answerType366413' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366413[]' id='answer-id-1427735' class='answer   answerof-366413 ' value='1427735'   \/><label for='answer-id-1427735' id='answer-label-1427735' class=' answer'><span>Transport Layer Security (TLS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366413[]' id='answer-id-1427736' class='answer   answerof-366413 ' value='1427736'   \/><label for='answer-id-1427736' id='answer-label-1427736' class=' answer'><span>Asymmetric encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366413[]' id='answer-id-1427737' class='answer   answerof-366413 ' value='1427737'   \/><label for='answer-id-1427737' id='answer-label-1427737' class=' answer'><span>Symmetric encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366413[]' id='answer-id-1427738' class='answer   answerof-366413 ' value='1427738'   \/><label for='answer-id-1427738' id='answer-label-1427738' class=' answer'><span>Hash encryption<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-100' style=';'><div id='questionWrap-100'  class='   watupro-question-id-366414'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>100. <\/span>Which network security concept focuses on limiting network access based on user roles and responsibilities?<\/div><input type='hidden' name='question_id[]' id='qID_100' value='366414' \/><input type='hidden' id='answerType366414' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366414[]' id='answer-id-1427739' class='answer   answerof-366414 ' value='1427739'   \/><label for='answer-id-1427739' id='answer-label-1427739' class=' answer'><span>Intrusion detection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366414[]' id='answer-id-1427740' class='answer   answerof-366414 ' value='1427740'   \/><label for='answer-id-1427740' id='answer-label-1427740' class=' answer'><span>Access control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366414[]' id='answer-id-1427741' class='answer   answerof-366414 ' value='1427741'   \/><label for='answer-id-1427741' id='answer-label-1427741' class=' answer'><span>Vulnerability scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-366414[]' id='answer-id-1427742' class='answer   answerof-366414 ' value='1427742'   \/><label for='answer-id-1427742' id='answer-label-1427742' class=' answer'><span>Network segmentation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-101'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons9238\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"9238\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-10 16:23:43\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1778430223\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"366315:1427343,1427344,1427345,1427346 | 366316:1427347,1427348,1427349,1427350 | 366317:1427351,1427352,1427353,1427354 | 366318:1427355,1427356,1427357,1427358 | 366319:1427359,1427360,1427361,1427362 | 366320:1427363,1427364,1427365,1427366 | 366321:1427367,1427368,1427369,1427370 | 366322:1427371,1427372,1427373,1427374 | 366323:1427375,1427376,1427377,1427378 | 366324:1427379,1427380,1427381,1427382 | 366325:1427383,1427384,1427385,1427386 | 366326:1427387,1427388,1427389,1427390 | 366327:1427391,1427392,1427393,1427394 | 366328:1427395,1427396,1427397,1427398 | 366329:1427399,1427400,1427401,1427402 | 366330:1427403,1427404,1427405,1427406 | 366331:1427407,1427408,1427409,1427410 | 366332:1427411,1427412,1427413,1427414 | 366333:1427415,1427416,1427417,1427418 | 366334:1427419,1427420,1427421,1427422 | 366335:1427423,1427424,1427425,1427426 | 366336:1427427,1427428,1427429,1427430 | 366337:1427431,1427432,1427433,1427434 | 366338:1427435,1427436,1427437,1427438 | 366339:1427439,1427440,1427441,1427442 | 366340:1427443,1427444,1427445,1427446 | 366341:1427447,1427448,1427449,1427450 | 366342:1427451,1427452,1427453,1427454 | 366343:1427455,1427456,1427457,1427458 | 366344:1427459,1427460,1427461,1427462 | 366345:1427463,1427464,1427465,1427466 | 366346:1427467,1427468,1427469,1427470 | 366347:1427471,1427472,1427473,1427474 | 366348:1427475,1427476,1427477,1427478 | 366349:1427479,1427480,1427481,1427482 | 366350:1427483,1427484,1427485,1427486 | 366351:1427487,1427488,1427489,1427490 | 366352:1427491,1427492,1427493,1427494 | 366353:1427495,1427496,1427497,1427498 | 366354:1427499,1427500,1427501,1427502 | 366355:1427503,1427504,1427505,1427506 | 366356:1427507,1427508,1427509,1427510 | 366357:1427511,1427512,1427513,1427514 | 366358:1427515,1427516,1427517,1427518 | 366359:1427519,1427520,1427521,1427522 | 366360:1427523,1427524,1427525,1427526 | 366361:1427527,1427528,1427529,1427530 | 366362:1427531,1427532,1427533,1427534 | 366363:1427535,1427536,1427537,1427538 | 366364:1427539,1427540,1427541,1427542 | 366365:1427543,1427544,1427545,1427546 | 366366:1427547,1427548,1427549,1427550 | 366367:1427551,1427552,1427553,1427554 | 366368:1427555,1427556,1427557,1427558 | 366369:1427559,1427560,1427561,1427562 | 366370:1427563,1427564,1427565,1427566 | 366371:1427567,1427568,1427569,1427570 | 366372:1427571,1427572,1427573,1427574 | 366373:1427575,1427576,1427577,1427578 | 366374:1427579,1427580,1427581,1427582 | 366375:1427583,1427584,1427585,1427586 | 366376:1427587,1427588,1427589,1427590 | 366377:1427591,1427592,1427593,1427594 | 366378:1427595,1427596,1427597,1427598 | 366379:1427599,1427600,1427601,1427602 | 366380:1427603,1427604,1427605,1427606 | 366381:1427607,1427608,1427609,1427610 | 366382:1427611,1427612,1427613,1427614 | 366383:1427615,1427616,1427617,1427618 | 366384:1427619,1427620,1427621,1427622 | 366385:1427623,1427624,1427625,1427626 | 366386:1427627,1427628,1427629,1427630 | 366387:1427631,1427632,1427633,1427634 | 366388:1427635,1427636,1427637,1427638 | 366389:1427639,1427640,1427641,1427642 | 366390:1427643,1427644,1427645,1427646 | 366391:1427647,1427648,1427649,1427650 | 366392:1427651,1427652,1427653,1427654 | 366393:1427655,1427656,1427657,1427658 | 366394:1427659,1427660,1427661,1427662 | 366395:1427663,1427664,1427665,1427666 | 366396:1427667,1427668,1427669,1427670 | 366397:1427671,1427672,1427673,1427674 | 366398:1427675,1427676,1427677,1427678 | 366399:1427679,1427680,1427681,1427682 | 366400:1427683,1427684,1427685,1427686 | 366401:1427687,1427688,1427689,1427690 | 366402:1427691,1427692,1427693,1427694 | 366403:1427695,1427696,1427697,1427698 | 366404:1427699,1427700,1427701,1427702 | 366405:1427703,1427704,1427705,1427706 | 366406:1427707,1427708,1427709,1427710 | 366407:1427711,1427712,1427713,1427714 | 366408:1427715,1427716,1427717,1427718 | 366409:1427719,1427720,1427721,1427722 | 366410:1427723,1427724,1427725,1427726 | 366411:1427727,1427728,1427729,1427730 | 366412:1427731,1427732,1427733,1427734 | 366413:1427735,1427736,1427737,1427738 | 366414:1427739,1427740,1427741,1427742\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"366315,366316,366317,366318,366319,366320,366321,366322,366323,366324,366325,366326,366327,366328,366329,366330,366331,366332,366333,366334,366335,366336,366337,366338,366339,366340,366341,366342,366343,366344,366345,366346,366347,366348,366349,366350,366351,366352,366353,366354,366355,366356,366357,366358,366359,366360,366361,366362,366363,366364,366365,366366,366367,366368,366369,366370,366371,366372,366373,366374,366375,366376,366377,366378,366379,366380,366381,366382,366383,366384,366385,366386,366387,366388,366389,366390,366391,366392,366393,366394,366395,366396,366397,366398,366399,366400,366401,366402,366403,366404,366405,366406,366407,366408,366409,366410,366411,366412,366413,366414\";\nWatuPROSettings[9238] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 9238;\t    \nWatuPRO.post_id = 93079;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.96286300 1778430223\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(9238);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>The Cisco Certified Support Technician (CCST) Cybersecurity is one of the Cisco CCST certification exams, which validates your skills and knowledge of entry-level cybersecurity concepts and topics, including security principles, network security and endpoint security concepts, vulnerability assessment and risk management, and incident handling. It is a first step toward CyberOps Associate certification. To earn [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[103,17107],"tags":[17920,17921],"class_list":["post-93079","post","type-post","status-publish","format-standard","hentry","category-cisco","category-cisco-certified-support-technician-ccst","tag-100-160-exam-dumps","tag-cisco-certified-support-technician-ccst-cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/93079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=93079"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/93079\/revisions"}],"predecessor-version":[{"id":93082,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/93079\/revisions\/93082"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=93079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=93079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=93079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}