Oracle Cloud Cybersecurity

 Test: Skill Check: Cybersecurity Introduction

1. Which type of attack involves the use of cyber capabilities to compel an opponent to do something by using force or other unethical means?
Ans: Coercion 

2. Which is one of the vital axes of cyber defense?
Ans: People 

3. Which term denotes a broad set of tactics and solutions to minimize the risk and impact of a cybersecurity incident?
Ans: Cybersecurity 

4. You find that your requests are being redirected to invalid destinations. Which type of malicious attack are you experiencing?
Ans: Service interruption 


5. Which architecture is based on the principle of “never trust, always verify”?
Ans: Zero trust 

6. What is the correct order of developments in the advent of cybersecurity?
a) Web 1.0: The first generation of services
b) Emergence of web-based email and rudimentary attack profiles
c) Migration to cloud
d) Distributed networks and remote access

Ans: b, a, d, c

Test: Skill Check: Cybersecurity Basics
1. Which type of software can you use to centrally distribute and monitor patching for systems throughout the enterprise?
Ans: Patch Management software 

2. Which type of hacking involves attempting to gain unauthorized access to an IT system, application, or data with the permission of its owner to determine its vulnerabilities and weak points?
Ans: Ethical hacking 

3. You want a software that can automatically collect, and aggregate log data generated throughout your organization’s infrastructure, analyze it, and send alerts if it detects a deviation from the norm.
Which software will you use?
Ans: Security Information and Event Management (SIEM) 


4. You have subscribed to a PaaS service that follows the Shared Security Responsibility model.
Which part of security is your responsibility?
Ans: Data

5. Which type of firewall is designed to protect against web application attacks, such as SQL injection and cross-site scripting?
Ans: Web application firewall