is a technique used to hide real data by replacing it with fake but realistic data. This allows organizations to use the data for testing, training, or analysis without exposing sensitive information.
Data Masking
is a cybersecurity solution that monitors computers, laptops, and other endpoints for suspicious activity. It detects, investigates, and responds to threats in real time—helping security teams stop attacks like malware or ransomware before they spread.
Endpoint Detection and Response (EDR)
is a data protection method that replaces sensitive information—like credit card numbers or Social Security numbers—with a random string of characters
Tokenization
involves delegating responsibility for specific tasks or projects, ensuring there is a clear point of accountability for planning, execution, and follow-up
Ownership
primarily addresses the prevention of email spoofing by allowing the receiving email server to check that an email claimed to have come from a specific domain was indeed authorized by the owner of that domain
DKIM (DomainKeys Identified Mail)
ensure continuous operation by having backup components ready to take over in case of a failure, unlike single points of failure which can lead to complete system shutdowns
Redundant systems
During a vulnerability scan, what activity is MOST critical to ensuring the effectiveness of the scan?
Selecting the correct scan type and depth
Implementing firewalls primarily serves as a __ control. This is because firewalls are hardware or software-based systems designed to filter incoming and outgoing network traffic based on a set of security rules
technical
The __ in change management is when proposed changes are tried out in a controlled environment to verify that they work correctly, don’t introduce new problems, and meet performance and security requirements before being fully deployed.
Test Phase
In the context of identity and access management, which of the following best ensures that users have access only to the resources they’ve been explicitly granted?
RBAC
is the best technique for securing customer payment information within databases, as it replaces sensitive data elements with non-sensitive equivalents, which can be safely stored and processed without exposing the original data
Tokenization
is the practice of hiding information inside something else—like embedding a secret message within an image, audio file, or text
Steganography
Signs of __ include unusual network traffic, system slowdowns, unexpected crashes, unauthorized file changes, or programs running without user initiation.
malicious code
The attacker sends requests to third-party servers using the victim’s IP as the source. Those servers then send responses to the victim, amplifying the traffic and hiding the attacker’s identity.
Reflected DDOS
Which agreement type is best suited for establishing the general terms and conditions between an organization and its vendors, which will govern future transactions and services?
The Master Service Agreement (MSA)
Blocking websites with low reputation scores is an effective way to protect against __ , as these sites are often newly created or known to host malicious content
phishing attacks
The ___ feature of Public Key Infrastructure (PKI) is utilized to ensure that only the intended recipients can read the content of emails
Public Key
How does the CVE aid in vulnerability management?
By offering a unique identifier for publicly known vulnerabilities.
a hardware-based security chip built into many modern laptops and desktops. It securely stores cryptographic keys, passwords, and certificates, and it’s commonly used for:
TPM
The technology that offers robust key storage and cryptographic operations for cloud applications
Hardware Security Module (HSM)
are security measures designed to protect the physical environment—the buildings, equipment, and personnel—from unauthorized access or damage.
Physical controls
use hardware, software, or firmware to enforce security policies and protect information systems.
Technical controls
is a type of malicious software designed to hide its presence and give an attacker unauthorized, privileged access to a computer or network.
Rootkit
a type of malicious software that disguises itself as a legitimate program to trick users into installing or running it.
Trojan