Question 1: How does "Continuous Monitoring" help in managing cybersecurity risks in aerospace and defense?
Which action should you take?
Question 2: What is the main purpose of the HMAC (Hash-Based Message Authentication Code) in securing data?
Which action should you take?
Question 3: What is the most effective way to test the security of a system during a red team exercise?
Which action should you take?
Question 4: What is the purpose of "Multi-Factor Authentication" (MFA) in securing network access in defense systems?
Which action should you take?
Question 5: In securing a defense network, what is the main advantage of using a certificate authority (CA) for public key infrastructure (PKI)?
Which action should you take?
Question 6: Which of the following protocols is commonly used to secure email communication in defense environments?
Which action should you take?