A data loss prevention (DLP) program helps protect an organization from exfiltration of sensitive data. This is because exfiltration of sensitive data is a type of cyberattack that involves stealing or leaking sensitive or confidential information from an organization’s systems or networks to an external destination or party. Exfiltration of sensitive data can cause serious harm to an organization’s reputation, operations, finances, legal compliance, etc. A DLP program helps to prevent exfiltration of sensitive data by detecting and blocking any unauthorized or suspicious attempts to access, copy, transfer, or share sensitive data by users or applications. The other options are not cyberattacks that a DLP program helps protect an organization from, but rather different types of cyberattacks that affect other aspects or objectives of information security, such as crypto ransomware infection (A), unauthorized access to servers and applications (B), or unauthorized data modification C.
Question 2
Which of the following is MOST effective in detecting unknown malware?
Options:
A.
Host-based firewall
B.
Signature-based anti-malware
C.
Regular patching
D.
Heuristic-based anti-malware
Answer:
D
Explanation:
Explanation:
Heuristic-based anti-malware is designed to detect new, previously unknown viruses and exploits by looking for known suspicious behavior patterns or anomalies. Unlike signature-based anti-malware, which relies on a database of known malware signatures, heuristic analysis can identify new threats without prior knowledge of the specific malware, making it more effective against unknown malware.
References: The effectiveness of heuristic-based anti-malware is supported by cybersecurity resources that highlight its ability to catch and block new and emerging threats before they can cause harm, as well as its capability to reduce false positives by evaluating the behavior of a file or program1. Additionally, heuristic analysis is recognized for its proactive threat detection, offering protection against malware that has yet to be discovered2.
Question 3
he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:
Options:
A.
common vulnerabilities.
B.
unknown vulnerabilities.
C.
known vulnerabilities.
D.
zero-day vulnerabilities.
Answer:
C
Explanation:
Explanation:
The MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect known vulnerabilities. This is because vulnerability scanners rely on databases or repositories of known vulnerabilities, such as CVE (Common Vulnerabilities and Exposures), to compare and identify the weaknesses or flaws in systems or applications. Vulnerability scanners cannot detect unknown vulnerabilities, such as zero-day vulnerabilities, that have not been reported or disclosed yet, and may be exploited by attackers before they are patched or fixed. The other options are not the most significant limitation of vulnerability scanning, because they either involve detecting common (A), unknown (B), or zero-day (D) vulnerabilities, which are not the capabilities or limitations of modern scanners.