1. What is a common vulnerability in operating systems?
2. Which of the following is an example of a device vulnerability?
3. What is the primary risk of using outdated firmware on a device?
4. Which of the following is a common OS vulnerability?
5. What is the primary purpose of patching an operating system?
6. What is a common vulnerability in web applications?
7. Which of the following is a cloud-specific vulnerability?
8. What is the primary risk of using insecure APIs in cloud applications?
9. Which of the following is a common application vulnerability?
10. What is the primary purpose of input validation in applications?
11. What is the primary risk of using weak encryption in cloud storage?
12. Which of the following is an example of a physical security measure?
13. What is the primary purpose of a Web Application Firewall (WAF)?
14. Which of the following is a common vulnerability in mobile applications?
15. What is the primary purpose of penetration testing in cloud environments?
16. What is the primary risk of using shared resources in cloud environments?
17. Which of the following is a common vulnerability in APIs?
18. What is the primary purpose of encryption in cloud storage?
19. Which of the following is a common vulnerability in containerized applications?
20. What is the primary purpose of a vulnerability scanner in cloud environments?