Part 1

A digital illustration of a cybersecurity theme, featuring a lock, a shield, a computer network, and symbols representing data protection, surrounded by abstract technology elements.

Cybersecurity Knowledge Assessment

Test your knowledge on the essential principles of cybersecurity with this comprehensive quiz! Whether you are a beginner or an expert, this quiz offers valuable insights into various topics, including network security, compliance regulations, and data protection measures.

  • 25 challenging questions
  • Multiple choice format
  • Immediate feedback on your answers
25 Questions6 MinutesCreated by SecuringData321
Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would jeopardize confidentiality?
Implementing LAN configuration standards
Securing wiring closets
Applying strong encryption
Applying patches promptly
The anti-malware utility is one of the most popular backdoor tools in use today.
False
True
What compliance regulation applies specifically to the educational records maintained by schools about students?
Federal Information Security Management Act (FISMA)
Health Insurance Portability and Accountability Act (HIPAA)
Gramm-Leach-Bliley Act (GLBA)
Family Education Rights and Privacy Act (FERPA)
Which practice is NOT considered unethical under RFC 1087 issued by the Internet Architecture Board (IAB)?
Compromising the privacy of users
Enforcing the integrity of computer-based information
Disrupting intended use of the Internet
Seeking to gain unauthorized access to resources
What is a set of concepts and policies for managing IT infrastructure, development, and operations?
Control Objectives for Information and related Technology (COBIT)
IT Infrastructure Library (ITIL)
NIST Cybersecurity Framework (CSF)
ISO 27002
A report indicates that a system's disk is 80 percent full is a good indication that something is wrong with that system.
False
True
Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?
Applying security updates promptly
Removing IoT devices from the network
Using encryption for communications
Turning IoT devices off when not in use
In what type of attack does the attacker send unauthorized commands directly to a database?
Database dumping
SQL injection
Cross-site request forgery
Cross-site scripting
Connectivity is one of the five critical challenges that the Internet of Things (IoT) has to overcome.
True
False
Holly would like to run an annual major disaster recovery test that is as thorough and realistic as possible. She also wants to ensure that there is no disruption of activity at the primary site. What option is best in this scenario?
Simulation test
Full interruption test
Parallel test
Checklist test
Authentication controls include passwords and personal identification numbers (PINs).
False
True
What is NOT a commonly used endpoint security technique?
Application control
Network firewall
Remote wiping
Full device encryption
For businesses and organizations under recent compliance laws, data classification standards typically include private, confidential, internal use only, and public domain categories.
False
True
Fran is conducting a security test of a new application. She does not have any access to the source code or other details of the application she is testing. What type of test is Fran conducting?
Blue-box test
Black-box test
White-box test
Grey-box test
An bricks-and-mortar strategy includes marketing and selling goods and services on the Internet.
True
False
A smart card is a token shaped like a credit card that contains one or more microprocessor chips that accept, store, and send information through a reader.
False
True
Alan is developing a business impact assessment for his organization. He is working with business units to determine the maximum allowable time to recover a particular function. What value is Alan determining?
Recovery time objective (RTO)
Recovery point objective (RPO)
Technical recovery requirements
Business recovery requirements
Data loss prevention (DLP) uses business rules to classify sensitive information to prevent unauthorized end users from sharing it.
False
True
Using Mobile IP, users can move between segments on a local area network (LAN) and stay connected without interruption.
True
False
Change doesn't create risk for a business.
False
True
Temporal isolation is commonly used in combination with rule-based access control.
False
True
Application service providers (ASPs) are software companies that build applications hosted in the cloud and on the Internet.
False
True
Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to communicate in a standard fashion?
Compliance
Interoperability
Privacy
Security
Bricks-and-mortar stores are completely obsolete now.
False
True
Juan's web server was down for an entire day last September. It experienced no other downtime during that month. Which one of the following represents the web server uptime for that month?
3.33%
0.04%
96.67%
99.96%
{"name":"Part 1", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on the essential principles of cybersecurity with this comprehensive quiz! Whether you are a beginner or an expert, this quiz offers valuable insights into various topics, including network security, compliance regulations, and data protection measures.25 challenging questionsMultiple choice formatImmediate feedback on your answers","img":"https:/images/course2.png"}
Powered by: Quiz Maker