701 - Test 2

Which of the following terms describes the process of identifying differences between an organization's current security posture and its desired security posture?

Gap analysis

The term "Zero Trust security" refers to a cybersecurity model that eliminates implicit trust from networks and requires all users and devices to be continuously verified before being granted access to resources. The implementation of the Zero Trust security involves two distinct components: a Data Plane, responsible for defining and managing security policies, and a Control Plane, responsible for enforcing the security policies established by the Data Plane.

False 

Which of the answers listed below refers to a Zero Trust Control Plane security approach that takes into account user identity, device security, network conditions, and other contextual information to enable dynamic access decisions?

Adaptive identity

What are the key components of the Zero Trust Control Plane's Policy Decision Point (PDP)? (Select 2 answers)

Policy Engine (PE)
Policy Administrator (PA) 

In the Zero Trust security architecture, the Policy Enforcement Point (PEP) is a Data Plane component that enforces the security policies defined at the Control Plane by the Policy Decision Point (PDP).

True

An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.

True

What is a honeytoken?

A unique identifier that is designed to track attackers

A process used by organizations to assess and evaluate the potential impact of disruptive incidents or disasters on their critical business functions and operations is referred to as:

BIA

A hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is known as:

PKI

Key escrow is a cryptographic technique that enables storing copies of encryption keys with a trusted third party. A Recovery Agent (RA) is a trusted third party (an individual, entity, or system) who is authorized to assist in the retrieval of encryption keys and data on behalf of the data owner. Key escrow and RA are both used to ensure that encrypted data can be decrypted even if the data owner loses access to their encryption key. Since key escrow and RAs are both components of a single security solution, the only way to implement key escrow systems is with the use of RAs.

False

Which of the following answers refers to a data storage device equipped with hardware-level encryption functionality?

SED

Which of the answers listed below refers to software technology designed to provide confidentiality for an entire data storage device?

FDE

An MS Windows component that enables encryption of individual files is called:

EFS

Which of the following software application tools are specifically designed for implementing encryption algorithms to secure data communication and storage? (Select 2 answers)

GPG
PGP

Which of the answers listed below refers to a deprecated TLS-based method for secure transmission of email messages?

SMTPS

Which of the following answers refers to an obsolete protocol used for secure data transfer over the web?

SHTTP

Last updated