Episodios

  • The podcast episode "Decoded – Unmasking the CEH" provides a comprehensive guide to the Certified Ethical Hacker (CEH) certification. Hosted by Edward Henriquez, the episode outlines what the CEH is, its significance in cybersecurity, and the career opportunities it can unlock. It thoroughly breaks down the 20 domains covered in the CEH exam, including topics like reconnaissance, network scanning, system hacking, and web application attacks. The podcast also offers advice on how to effectively prepare for the exam, suggesting study materials, hands-on practice, and the use of specific tools. Furthermore, it discusses the value of the CEH certification in comparison to other cybersecurity credentials. Ultimately, the episode aims to equip listeners with a clear understanding of the CEH and the steps needed to pursue it.

  • Decoded: The Open-Source Arsenal – Deep Dive into DFIR Tools is a podcast episode hosted by Edward Henriquez that explores a variety of open-source tools critical for digital forensics and incident response (DFIR). The episode examines tools used in disk and memory forensics, such as Autopsy, The Sleuth Kit, Volatility, and Rekall, for analyzing compromised systems and memory dumps. It further discusses network forensics with Wireshark, Zeek, and Suricata for traffic analysis and threat detection. Additionally, the episode covers log and event analysis using the ELK Stack and Graylog, as well as malware analysis with YARA, Ghidra, and Radare2. Finally, it touches upon incident response and threat hunting tools like Velociraptor, GRR Rapid Response, and Osquery, and concludes with cloud forensics tools for AWS and GCP, highlighting their importance in uncovering cyber threats.

  • ¿Faltan episodios?

    Pulsa aquí para actualizar resultados

  • This podcast episode of "Decoded" explores the importance of Unix in cybersecurity. It traces Unix's origins and its influence on modern operating systems and security practices. The episode highlights essential Unix commands for security professionals and explains effective patching and update strategies. It also shows how to use Ansible for automating Unix security tasks such as enforcing policies, deploying intrusion detection tools, and managing user privileges. Ultimately, the podcast underscores why proficiency in Unix is critical for anyone serious about a career in cybersecurity.

  • Edward Henriquez hosts the "Decoded Podcast". The YouTube video by "UnixGuy | Cyber Security" outlines a comprehensive six-month plan for individuals seeking entry-level cybersecurity positions without prior experience or degrees. It emphasizes practical, hands-on skills, starting with the Google Cybersecurity Certificate. The plan includes resume building, focusing on relevant experience, immediately applying for jobs to gain confidence, becoming a cybersecurity generalist before specializing, participating in virtual internships, and engaging in intermediate-level training.

  • PurpleLab is an open-source cybersecurity lab designed to help security teams detect, analyze, and simulate cyber threats. It provides a sandboxed environment with tools for testing detection rules, generating realistic logs, and executing malware. The lab includes a web interface, a Windows 10 virtual machine with forensic tools, and integration with the ELK stack for log analysis. Administrators can configure LDAP settings and API keys, as well as set up integration with Splunk. PurpleLab requires a clean installation of Ubuntu Server 22.04 and offers various pages for monitoring, hunting, simulating attacks, and managing system health.

  • This podcast episode of Decoded, hosted by Edward Henriquez, addresses the ever-present threat of password cracking. It explores three common methods used by hackers: brute force attacks, dictionary attacks, and rainbow table attacks. For each technique, Henriquez provides real-world examples of successful breaches, highlighting the potential damage. Most importantly, the podcast offers actionable advice on how individuals and organizations can strengthen their password security through strategies like using long, complex passwords, enabling multi-factor authentication, and implementing robust password policies. The goal is to empower listeners with the knowledge to defend themselves against these prevalent cyber threats.

  • This curated list highlights top books for mastering Open-Source Intelligence (OSINT). The texts cover diverse aspects, from cybercrime investigation and strategic thinking to human rights documentation and digital privacy. Several books offer practical guidance on OSINT techniques, data analysis, and ethical considerations. Some focus on applying OSINT in specific domains like cybersecurity and corporate due diligence. Others explore the psychological dimensions of social engineering for ethical intelligence gathering. Overall, the collection equips readers with comprehensive knowledge for leveraging publicly available data across various fields.

  • The CrowdStrike 2024 Threat Hunting Report analyzes the evolving cyber threat landscape over the past year. It highlights the rise of stealthy, cross-domain attacks targeting identity, endpoints, and cloud environments. The report emphasizes the increasing use of legitimate tools like RMM software by adversaries for malicious purposes and insider threats exploiting recruitment processes. CrowdStrike's OverWatch team uses threat intelligence, AI, and proactive hunting to detect and disrupt these advanced threats, ultimately strengthening the Falcon platform's defenses. Case studies illustrate real-world examples of adversaries like SCATTERED SPIDER and FAMOUS CHOLLIMA, and detail the tactics used to counter them.

  • This podcast episode discusses using artificial intelligence (AI) to enhance cybersecurity. It focuses on running Large Language Models (LLMs) locally for improved security, pretraining AI models for threat detection and anomaly identification, and building AI-driven proof-of-concept security tools. Specific open-source LLMs like DeepSeek, Tulu-3, and Tongyi are highlighted for their applications in various security tasks. The episode emphasizes the benefits of AI in automating security workflows, improving response times, and reducing alert fatigue. Finally, it promotes building custom AI security tools using readily available technologies like Docker and Fast-LLM.

  • Ethical hacker Ryan Montgomery demonstrates various hacking techniques in a YouTube video, highlighting vulnerabilities in Wi-Fi networks, wireless devices (keyboards, mice, car keys), and even seemingly innocuous devices like vacuum cleaners. He showcases attacks like man-in-the-middle attacks and zero-click exploits, emphasizing how easily personal data (passwords, credit card information) can be stolen. The video stresses the importance of proactive security measures, including using password managers, antivirus software, RFID-blocking wallets, and regularly updating software. Ultimately, the video serves as a wake-up call regarding the pervasive nature of cyber threats and the need for enhanced digital security.

  • Edward Henriquez's CyberFrontiers podcast episode discusses the rising threat of deepfakes and AI-driven social engineering. The podcast explains how deepfake technology uses AI to create realistic but fake audio and video, providing examples of real-world fraudulent activities. It then highlights efforts by tech companies and government agencies to develop deepfake detection technologies. Finally, it offers practical advice for individuals and businesses to protect themselves from these sophisticated attacks, emphasizing the need for increased skepticism and multi-factor authentication. The episode concludes by advocating for stronger regulations and ethical AI development to combat the misuse of deepfake technology.

  • This podcast episode, "Patch or Perish," advocates for improved endpoint patch management to boost ROI. It highlights the substantial financial risks of inadequate patching, citing costly data breaches and downtime. The episode promotes integrating Microsoft Intune with Automox for automated patching, emphasizing cost savings through reduced manual labor, breach prevention, and increased uptime. Real-world examples of companies suffering massive losses due to poor patching are used to underscore the urgency of implementing a robust strategy. The podcast concludes with a clear, actionable plan for building a high-ROI patch management system.

  • Ghost GPT, a new AI model, is explained as a significant cybersecurity threat due to its ability to create highly realistic, deceptive communications for phishing and social engineering attacks. Unlike traditional malware, its adaptive nature makes detection difficult, requiring AI-powered solutions for effective mitigation. The podcast advocates for a proactive defense strategy involving investments in advanced security tools, employee training, and regular system updates. Organizations are urged to adopt a culture of cybersecurity awareness and leverage behavioral analytics to identify and counter these sophisticated AI-driven threats.

  • Open-source intelligence (OSINT) is the practice of gathering information from publicly available sources. The text describes how OSINT, initially used by military and intelligence agencies, is now crucial for cybersecurity. It details how organizations use OSINT to discover and analyze public-facing assets, identify potentially sensitive information, and improve their overall security posture. The text also lists numerous OSINT tools, outlining their functionalities and uses, emphasizing the importance of ethical and legal considerations when employing these techniques. Finally, it stresses the need to proactively address publicly accessible vulnerabilities to prevent exploitation by malicious actors.

  • The Cyber Security Podcast, hosted by industry experts, delves into the critical world of cyber threat intelligence (CTI). In this episode, the hosts explore the various types of CTI, including strategic, tactical, technical, and operational, and examine the crucial role played by CTI analysts. They discuss the intricacies of building a robust CTI program, focusing on the essential steps of data collection, analysis, and reporting. Additionally, the episode highlights the necessary skills and certifications for aspiring CTI professionals and addresses the growing demand for expertise in this field. As part of the discussion, the hosts look to the future of CTI and emphasize its pivotal role in shaping proactive cybersecurity strategies, making it an essential listen for anyone interested in the dynamic field of cybersecurity.

  • Domain 5: Security Operations

    What is the first step in the incident response process?

    A. Containment

    B. Detection and identification

    C. Recovery

    D. Eradication

    Answer: B

    What is the purpose of log analysis in security operations?

    A. Enhance system performance

    B. Identify and respond to suspicious activities

    C. Encrypt data

    D. Monitor user activity

    Answer: B

    Which of the following is a security incident?

    A. Failed login attempt

    B. Unauthorized access to sensitive files

    C. Network scan from a trusted device

    D. Scheduled maintenance

    Answer: B

    What is the purpose of a Security Information and Event Management (SIEM) system?

    A. Detect malware

    B. Centralize security monitoring and alerts

    C. Automate patching

    D. Block logins

    Answer: B

    What does “false positive” mean in security monitoring?

    A. Actual threat detected

    B. Threat blocked successfully

    C. Benign activity mistaken as a threat

    D. Failed login attempt

    Answer: C

    What is the primary purpose of vulnerability scanning?

    A. Identify unpatched systems

    B. Block malicious IPs

    C. Encrypt communications

    D. Monitor bandwidth

    Answer: A

    What is a common use case for a playbook in incident response?

    A. Automate tasks

    B. Guide teams through response

    C. Configure firewall rules

    D. Test vulnerabilities

    Answer: B

    What is the purpose of data retention policies?

    A. Encrypt sensitive files

    B. Define data storage duration

    C. Automate backups

    D. Block unauthorized access

    Answer: B

    Which type of malware locks users out until a ransom is paid?

    A. Worm

    B. Ransomware

    C. Trojan

    D. Spyware

    Answer: B

    What is the purpose of forensic analysis in security?

    A. Detect ongoing attacks

    B. Collect and analyze evidence

    C. Enhance encryption

    D. Automate scans

    Answer: B

    Which of the following prevents insider threats?

    A. Network segmentation

    B. Access monitoring and logging

    C. Multi-factor authentication

    D. Encryption

    Answer: B

    What is an important step in the post-incident process?

    A. Block all external connections

    B. Perform a root cause analysis

    C. Encrypt logs

    D. Restore access

    Answer: B

    Which of the following is an advanced persistent threat (APT)?

    A. Phishing email

    B. Long-term targeted attack by a skilled group

    C. Malware via USB drives

    D. Brute force attack

    Answer: B

    What is a zero-day vulnerability?

    A. Exploited weakness before patch release

    B. Outdated system vulnerability

    C. Malware-infected system

    D. Known weakness with no exploit

    Answer: A

    What is the purpose of a sandbox in malware analysis?

    A. Isolate and observe suspicious programs

    B. Encrypt files

    C. Block traffic

    D. Restore files

    Answer: A

    What is the role of a disaster recovery plan?

    A. Restore operations after disruption

    B. Prevent phishing attacks

    C. Automate backups

    D. Enforce compliance

    Answer: A

    What is the purpose of a business impact analysis (BIA)?

    A. Identify critical functions and their loss impact

    B. Detect malware infections

    C. Test firewall efficiency

    D. Test disaster plans

    Answer: A

    Which of the following is part of change management?

    A. Evaluate risks before changes

    B. Block unauthorized IPs

    C. Automate vulnerability scans

    D. Monitor physical access

    Answer: A

    What is the purpose of least privilege in access control?

    A. Minimize user/system permissions

    B. Encrypt data

    C. Maximize productivity

    D. Improve password complexity

    Answer: A

    What does a data loss prevention (DLP) solution do?

    A. Prevents sensitive data from unauthorized access/transmission

    B. Encrypts all network traffic

    C. Blocks malicious email attachments

    D. Restores deleted files

    Answer: A

  • Domain 4: Network Security (20 Questions)

    What is the purpose of a firewall?

    A. Detect malware

    B. Filter traffic between networks

    C. Encrypt sensitive information

    D. Manage network bandwidth

    Answer: B

    What type of attack floods a network to make resources unavailable?

    A. Man-in-the-middle

    B. Phishing

    C. Denial of Service (DoS)

    D. Replay

    Answer: C

    Which protocol encrypts data between a browser and server?

    A. FTP

    B. HTTP

    C. HTTPS

    D. Telnet

    Answer: C

    What is the primary function of a VPN?

    A. Secure email communications

    B. Provide an encrypted remote-access tunnel

    C. Monitor network activity

    D. Block unauthorized users

    Answer: B

    What is the goal of network segmentation?

    A. Reduce network congestion

    B. Isolate sensitive data/systems

    C. Increase encryption efficiency

    D. Enhance speed

    Answer: B

    What device connects network segments?

    A. Switch

    B. Router

    C. Firewall

    D. Load Balancer

    Answer: B

    Which protocol resolves domain names to IPs?

    A. HTTP

    B. DNS

    C. SMTP

    D. SNMP

    Answer: B

    What does an IDS do?

    A. Block unauthorized traffic

    B. Detect/alert suspicious activity

    C. Encrypt communications

    D. Filter email spam

    Answer: B

    Which prevents ARP spoofing?

    A. Dynamic IP allocation

    B. Static ARP tables

    C. NAT

    D. Gateway reconfiguration

    Answer: B

    What is a key benefit of a proxy?

    A. Hide internal IPs from external users

    B. Block malicious traffic at the packet level

    C. Encrypt all network traffic

    D. Prevent social media access

    Answer: A

    What is port scanning?

    A. Identify open ports on a device

    B. Encrypt incoming traffic

    C. Test firewall configurations

    D. Block unauthorized IPs

    Answer: A

    What is the purpose of tools like Wireshark?

    A. Test software vulnerabilities

    B. Analyze/capture network traffic

    C. Encrypt data in transit

    D. Configure firewalls

    Answer: B

    Which control allows traffic based on rules?

    A. Intrusion Prevention System (IPS)

    B. Firewall

    C. Network Access Control (NAC)

    D. Honeypot

    Answer: B

    What is a key advantage of a honeypot?

    A. Prevent phishing

    B. Attract attackers to identify malicious activity

    C. Improve encryption

    D. Block brute-force attacks

    Answer: B

    What is the role of DNSSEC?

    A. Secure email

    B. Prevent DNS spoofing, ensure integrity

    C. Encrypt DNS queries

    D. Improve bandwidth

    Answer: B

    Which protocol provides secure file transfer?

    A. FTP

    B. SFTP

    C. Telnet

    D. HTTP

    Answer: B

    What type of attack alters communications?

    A. Man-in-the-middle

    B. DoS

    C. Social engineering

    D. Replay

    Answer: A

    What is the function of NAC?

    A. Encrypt sensitive traffic

    B. Enforce device security policies

    C. Prevent malware

    D. Monitor unauthorized logins

    Answer: B

    Which wireless security protocol is most secure?

    A. WEP

    B. WPA

    C. WPA2

    D. WPA3

    Answer: D

    What is the purpose of VLANs?

    A. Increase speed

    B. Segment/isolate traffic for security

    C. Encrypt all traffic

    D. Prevent malware

    Answer: B

  • Domain 3: Access Control Concepts

    ​ Example of logical access control:

    A. Security guards

    B. Biometric authentication

    C. Passwords

    D. Fire alarms

    Answer: C

    ​ Multi-factor authentication (MFA) requires:

    A. Two or more forms of authentication from different categories

    B. The same password used in multiple places

    C. Multiple users authenticating simultaneously

    D. A combination of encryption methods

    Answer: A

    ​ Access control based on job roles:

    A. Discretionary Access Control (DAC)

    B. Role-Based Access Control (RBAC)

    C. Attribute-Based Access Control (ABAC)

    D. Mandatory Access Control (MAC)

    Answer: B

    ​ Access control granting permissions based on attributes like location:

    A. Attribute-Based Access Control (ABAC)

    B. Role-Based Access Control (RBAC)

    C. Mandatory Access Control (MAC)

    D. Discretionary Access Control (DAC)

    Answer: A

    ​ Access control using predefined rules/labels:

    A. Discretionary Access Control (DAC)

    B. Role-Based Access Control (RBAC)

    C. Mandatory Access Control (MAC)

    D. Attribute-Based Access Control (ABAC)

    Answer: C

    ​ Principle of least privilege:

    A. Giving users only necessary permissions

    B. Allowing administrators unlimited access

    C. Preventing user account creation

    D. Implementing mandatory security clearances

    Answer: A

    ​ Time-based access control:

    A. Granted only during specific hours

    B. Determined by user role

    C. Restricted to known locations

    D. Granted after authentication expires

    Answer: A

    ​ Centralized server enforcing access control policies:

    A. Firewall

    B. Directory Service

    C. Proxy Server

    D. Load Balancer

    Answer: B

    ​ Attack using stolen session token:

    A. Brute force

    B. Replay attack

    C. Session hijacking

    D. Phishing

    Answer: C

    ​ Access control model where users can grant/restrict access:

    A. Discretionary Access Control (DAC)

    B. Mandatory Access Control (MAC)

    C. Role-Based Access Control (RBAC)

    D. Attribute-Based Access Control (ABAC)

    Answer: A

    ​ Purpose of a password policy:

    A. Encrypt files

    B. Enforce secure password creation/management

    C. Monitor login attempts

    D. Limit account creation

    Answer: B

    ​ “Something you have” in MFA:

    A. Password

    B. Smart card

    C. Biometrics

    D. PIN

    Answer: B

    ​ Risk of sharing user credentials:

    A. Loss of password integrity

    B. Violation of encryption standards

    C. Increased bandwidth usage

    D. Unauthorized access

    Answer: D

    ​ Purpose of account lockout policies:

    A. Block malicious traffic

    B. Prevent brute force attacks

    C. Encrypt sensitive data

    D. Monitor login attempts

    Answer: B

    ​ Access control dynamically adjusting access by location:

    A. Attribute-Based Access Control (ABAC)

    B. Role-Based Access Control (RBAC)

    C. Mandatory Access Control (MAC)

    D. Discretionary Access Control (DAC)

    Answer: A

    ​ Primary purpose of biometric authentication:

    A. Enhance encryption

    B. Verify physical characteristics

    C. Monitor network traffic

    D. Backup critical data

    Answer: B

    ​ Granting temporary access:

    A. Privilege escalation

    B. Time-bound access

    C. User provisioning

    D. Conditional access

    Answer: B

    ​ Attack manipulating users to share confidential data:

    A. Malware

    B. Social engineering

    C. Phishing

    D. Keylogging

    Answer: B

    ​ Preventing password reuse:

    A. Multi-factor authentication

    B. Password history policies

    C. Single sign-on

    D. Encryption

    Answer: B

    ​ Primary function of access control logs:

    A. Block unauthorized users

    B. Record access attempts

    C. Update user roles

    D. Enforce encryption

    Answer: B

    ​ Purpose of a firewall:

    A. Detect malware

    B. Filter traffic between networks

    C. Encrypt sensitive information

    D. Manage bandwidth

    Answer: B

    ​ Attack flooding a network to disrupt resources:

    A. Man-in-the-middle

    B. Phishing

    C. Denial of Service (DoS)

    D. Replay

    Answer: C

  • Domain 2: Business Continuity

    What is the goal of a Business Continuity Plan (BCP)?

    A. Test incident response capabilities

    B. Ensure critical business functions continue during a disruption

    C. Mitigate cybersecurity vulnerabilities

    D. Monitor system performance

    Answer: B

    Key outcome of a Business Impact Analysis (BIA):

    A. Identifying threats

    B. Prioritizing critical systems and processes

    C. Writing security policies

    D. Testing disaster recovery systems

    Answer: B

    Part of a disaster recovery plan:

    A. Incident detection methods

    B. Recovery time objectives (RTOs)

    C. Employee training manuals

    D. Physical security controls

    Answer: B

    Recovery Point Objective (RPO):

    A. Maximum downtime for critical systems

    B. Maximum tolerable data loss

    C. Time to detect a security incident

    D. Frequency of backups

    Answer: B

    Test simulating a disaster to evaluate response plans:

    A. Tabletop exercise

    B. Walkthrough drill

    C. Full-scale test

    D. Functional test

    Answer: C

    Goal of high availability:

    A. Continuous system access

    B. Improved system integrity

    C. Increased network security

    D. Encrypted communication

    Answer: A

    Backup type copying data changed since the last full backup:

    A. Full backup

    B. Incremental backup

    C. Differential backup

    D. Mirror backup

    Answer: B

    Purpose of redundancy in business continuity:

    A. Reduce costs

    B. Ensure system reliability

    C. Improve encryption

    D. Eliminate testing

    Answer: B

    Alternate site fully operational during a disaster:

    A. Hot site

    B. Warm site

    C. Cold site

    D. Shadow site

    Answer: A

    Difference between disaster recovery and business continuity:

    A. Disaster recovery focuses on technology; business continuity on processes.

    B. Disaster recovery focuses on processes; business continuity on compliance.

    C. Disaster recovery is part of business continuity.

    D. They are unrelated.

    Answer: C

    Purpose of a contingency plan:

    A. Steps to respond to unexpected events

    B. Methods to eliminate risks

    C. Techniques for improving software development

    D. Guidelines for encryption protocols

    Answer: A

    Concept reducing disruption impact by relocating operations:

    A. Data recovery

    B. Risk mitigation

    C. Disaster recovery

    D. Continuity of operations

    Answer: D

    Tool estimating disruption probability and impact:

    A. Penetration test

    B. Business Impact Analysis (BIA)

    C. Security assessment

    D. Threat model

    Answer: B

    Tabletop exercise:

    A. Simulated, non-physical test of plans

    B. Full activation of business continuity protocols

    C. Automated system backup

    D. Incident monitoring solution

    Answer: A

    Ensures data recovery after a disaster:

    A. Firewalls

    B. Backups

    C. Multi-factor authentication

    D. Encryption

    Answer: B

    Document outlining roles during an incident:

    A. Business Impact Analysis

    B. Disaster Recovery Plan

    C. Incident Response Plan

    D. Access Control Policy

    Answer: C

    Difference between RTO and RPO:

    A. RTO = downtime; RPO = data loss tolerance.

    B. RTO = business processes; RPO = system availability.

    C. RTO = mitigation; RPO = recovery.

    D. They are identical.

    Answer: A

    System ensuring uninterrupted power during disasters:

    A. UPS (Uninterruptible Power Supply)

    B. Load balancer

    C. Firewall

    D. Proxy server

    Answer: A

    Purpose of a warm site:

    A. Immediate failover

    B. Partial functionality with setup required

    C. Basic physical location without equipment

    D. Duplicates live systems for seamless recovery

    Answer: B

    Process evaluating disaster recovery plan effectiveness:

    A. Penetration testing

    B. Backup monitoring

    C. Plan testing and exercises

    D. Incident response

    Answer: C

  • Domain 1: Security Principles

    1. Which part of the CIA triad ensures data is accessible when needed?

    A. Confidentiality

    B. Integrity

    C. Availability

    D. Authentication

    Answer: C. Availability

    2. What is the main purpose of confidentiality in information security?

    A. To ensure data is free from errors

    B. To ensure only authorized parties can access data

    C. To ensure data is accessible when needed

    D. To enforce accountability

    Answer: B. To ensure only authorized parties can access data

    3. Which security principle ensures data has not been altered during transmission?

    A. Integrity

    B. Confidentiality

    C. Availability

    D. Accountability

    Answer: A. Integrity

    4. Which of the following is considered a preventive control?

    A. Firewall

    B. Audit log

    C. Incident response plan

    D. Backup

    Answer: A. Firewall

    5. What does the principle of least privilege entail?

    A. Users should have the maximum access possible.

    B. Users should only have access necessary for their role.

    C. All access should be denied by default.

    D. Users should share accounts.

    Answer: B. Users should only have access necessary for their role.

    6. A policy requiring two people to approve a critical action is an example of:

    A. Separation of duties

    B. Job rotation

    C. Least privilege

    D. Defense in depth

    Answer: A. Separation of duties

    7. Encryption is primarily used to achieve:

    A. Availability

    B. Confidentiality

    C. Integrity

    D. Accountability

    Answer: B. Confidentiality

    8. Which of the following describes a threat?

    A. A weakness in a system

    B. A potential danger to a system

    C. A measure taken to reduce risk

    D. A way to detect vulnerabilities

    Answer: B. A potential danger to a system

    9. What is a vulnerability?

    A. A measure to counteract a threat

    B. A weakness in a system that can be exploited

    C. A probability of a threat occurring

    D. A risk to the system

    Answer: B. A weakness in a system that can be exploited

    10. What type of risk cannot be fully eliminated but must be accepted?

    A. Avoidable risk

    B. Residual risk

    C. Inherent risk

    D. Mitigated risk

    Answer: B. Residual risk

    11. Which of the following is an example of a physical control?

    A. Firewall rules

    B. Biometric scanners

    C. Encryption algorithms

    D. Password policies

    Answer: B. Biometric scanners

    12. What is an example of a deterrent control?

    A. Security guards

    B. Data backup

    C. Antivirus software

    D. Incident response

    Answer: A. Security guards

    13. What is the purpose of defense in depth?

    A. To focus all efforts on a single strong control

    B. To layer multiple security measures

    C. To ensure faster access to data

    D. To eliminate risks completely

    Answer: B. To layer multiple security measures

    14. Social engineering attacks primarily target:

    A. Software vulnerabilities

    B. Network protocols

    C. Human behavior

    D. Encryption mechanisms

    Answer: C. Human behavior

    15. Which of the following is an example of social engineering?

    A. Sending a phishing email

    B. Exploiting a software bug

    C. Performing a man-in-the-middle attack

    D. Cracking a password hash

    Answer: A. Sending a phishing email

    16. What is the primary goal of risk assessment?

    A. To eliminate all risks

    B. To identify and prioritize risks

    C. To design security controls

    D. To monitor security incidents

    Answer: B. To identify and prioritize risks

    17. Which type of attack involves overwhelming a network with traffic?

    A. Phishing

    B. Ransomware

    C. Denial of Service (DoS)

    D. Keylogging

    Answer: C. Denial of Service (DoS)

    18. What is the primary purpose of policies in cybersecurity?

    A. To replace technical controls

    B. To provide guidelines and expectations

    C. To replace monitoring systems

    D. To enforce compliance

    Answer: B. To provide guidelines and expectations

    19. A brute-force attack targets:

    A. The user’s personal details

    B. Guessing passwords systematically

    C. Exploiting a software vulnerability

    D. Social manipulation

    Answer: B. Guessing passwords systematically

    20. What type of malware encrypts files and demands payment for their release?

    A. Spyware

    B. Ransomware

    C. Worm

    D. Trojan

    Answer: B. Ransomware