Skip to content

Commit

Permalink
Remove repeated question with contradicting answer (Ebazhanov#2852)
Browse files Browse the repository at this point in the history
  • Loading branch information
petartodorov authored Dec 23, 2021
1 parent 319b49a commit a50c8a7
Showing 1 changed file with 3 additions and 10 deletions.
13 changes: 3 additions & 10 deletions cybersecurity/cybersecurity-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -416,28 +416,21 @@ autopsy is for forensic analysis
- [ ] Eradiction / Remediation
- [ ] Lessons Learned

#### Q55. Which is _not_ a principle of zero trust security?

- [x] assume breach
- [ ] verify explicitly
- [ ] use least privilege access
- [ ] trust but verify

#### Q56. Which programming language is most susceptible to buffer overflow attacks?
#### Q55. Which programming language is most susceptible to buffer overflow attacks?

- [x] C
- [ ] Java
- [ ] Ruby
- [ ] Python

#### Q57. Which list correctly describes risk management techniques?
#### Q56. Which list correctly describes risk management techniques?

- [ ] risk acceptance, risk mitigation, risk containment, and risk qualification
- [ ] risk avoidance, risk transference, risk containment, and risk quantification
- [ ] risk avoidance, risk mitigation, risk containment, and risk acceptance
- [x] risk avoidance, risk transference, risk mitigation, and risk acceptance

### Q58. To implement encryption in transit, such as with the HTTPS protocol for secure web browsing, which type(s) of encryption is/are used?
### Q57. To implement encryption in transit, such as with the HTTPS protocol for secure web browsing, which type(s) of encryption is/are used?

- [ ] asymmetric
- [x] both symmetric and asymmetric
Expand Down

0 comments on commit a50c8a7

Please sign in to comment.