51. What is the term for the process of analyzing network traffic for signs of a cybersecurity attack?
A) Intrusion detection
B) Intrusion prevention
C) Firewall management
D) Access control
52. Which of the following is a common type of authentication method?
A) Password
B) Token
C) Biometric
D) All of the above
53. Which type of cybersecurity attack involves hackers gaining access to a system by exploiting a vulnerability in the web browser?
A) Cross-site scripting attack
B) Cross-site request forgery attack
C) SQL injection attack
D) Buffer overflow attack
54. What is the term for the process of identifying and managing vulnerabilities in an organization’s systems and applications?
A) Vulnerability management
B) Penetration testing
C) Identity and access management
D) Network security
55. Which type of cybersecurity attack involves hackers gaining access to a system by exploiting a vulnerability in the server or network infrastructure?
A) Buffer overflow attack
B) SQL injection attack
C) Cross-site scripting attack
D) None of the above
56. What is the term for the practice of breaking down a network into smaller subnetworks in order to improve security and performance?
A) Network segmentation
B) Firewall management
C) Intrusion prevention
D) Access control
57. Which type of cybersecurity attack involves hackers gaining access to a system by exploiting a vulnerability in the application code?
A) SQL injection attack
B) Cross-site scripting attack
C) Cross-site request forgery attack
D) Man-in-the-middle attack