CISCO 100 160
Q: 1
Why is it important to maintain the chain of custody when handling digital evidence?
Options
Q: 2
Which protocol is used for communication between web browsers and web servers?
Options
Q: 3
Which of the following best describes the concept of automation in cybersecurity testing?
Options
Q: 4
Which of the following is an example of a data security principle?
Options
Q: 5
What type of encryption is used to secure data that is stored on a hard drive or other storage media?
Options
Q: 6
What is an Advanced Persistent Threat (APT)?
Options
Q: 7
Which of the following tools is primarily used for analyzing network packets?
Options
Q: 8
What is a common vulnerability in Internet of Things (IoT) devices?
Options
Q: 9
What is the primary reason for implementing multi-factor authentication in a cloud environment?
Options
Q: 10
What is a key principle of securing data in the cloud?
Options
Question 1 of 10