Answer
B) Something you know and something you have
Explanation: PIN = something you know; Badge = something you have. Questions 71–8O Q71. Which technology allows secure remote access to a corporate network by encrypting all traffic? VLAN IDS VPN Proxy Server Q72. An employee leaves a confidential document on a shared printer. What kind of risk is this? Insider Threat Physical Security Risk Supply Chain Risk Malware Infection Q73. Which of the following would MOST effectively prevent malware from executing on endpoints? Application Allowlisting IDS Deployment SSL/TLS Encryption Role-Based Access Control Q74. A company requires that users verify their identity using a username, password, and fingerprint scan. This is an example of: Multi-Factor Authentication Federation SSO Kerberos Authentication Q75. Which security principle ensures that critical functions are divided among multiple people to prevent fraud? Least Privilege Separation of Duties Job Rotation Dual Control Q76. What technique is used by attackers to overload a server with requests, causing service disruption? SQL Injection DNS Poisoning DDoS Attack ARP Spoofing Q77. Which of the following devices inspects and filters packets based on application-level data? Traditional Firewall Proxy Server Next-Generation Firewall (NGFW) Router Q78. Which method ensures that a user cannot deny performing an action, such as sending an email? Non-Repudiation Availability Encryption Role-Based Access Control Q7G. An attacker exploits a race condition in a web application. What is this an example of? Improper Input Handling Application Logic Flaw Secure Coding Practice Race Attack Vulnerability Q8O. Which of the following is a benefit of implementing Infrastructure as Code (IaC) securely? Manual configuration of servers Consistent and repeatable deployments Physical separation of networks Encrypted communication tunnels