Saturday, April 8, 2017

CyberSecurity: An Introduction to Cybersecurity - Quiz

Which of the following security controls can be used to limit access to certain servers hosted in the cloud service provider facility?

Select one:
a. Firewall
b. Intrusion Detection System
c. Network Monitoring System
d. Packet Analysis Tool



IT Certification Category (French)728x90

Securing the data centre with lock and closed-circuit television (CCTV) is an example of which security control category?

Select one:
a. Physical
b. Policy
c. Virtual
d. Technical

An attacker will take advantage of the easiest way to bypass the security controls implemented in an organisation. This is also known as the:

Select one:
a. Principle of Defense
b. Principle of Exploitation
c. Principle of the Least Privilege
d. The principle of the weakest link

Which of the following can help achieve the security goal of ensuring integrity?

Select one:
a. Intrusion Detection System
b. Firewall
c. Content Distribution Network
d. Digital Signature

Which of the following is not an example of Two-Factor Authentication (2FA)?

Select one:
a. The chip and PIN on a bank card
b. Hardware security token and password
c. Entering your password twice
d. A VPN token and password

One of the responsibilities of a security auditor is to

Select one:
a. Analyze logs and netflows for signs of attacks
b. Configure firewall rules
c. Ensure compliance to security policies
d. Write signatures for the intrusion detection system

Which of the following can mitigate the risk of identity theft attacks?

Select one:
a. Patch Management
b. Firewall
c. Intrusion Detection System
d. Two Factor Authentication

Which of the following entities is responsible for delegating Internet Protocol (IP) addresses and Autonomous System (AS) numbers to network operators?

Select one:
a. Domain Name Registrar
b. Law Enforcement Agencies
c. Regional Internet Registry
d. National Computer Emergency Response Team

Mobile Apps Category (English)728x90

Risks that are identified can be mitigated by which of the following activity?

Select one:
a. Monitoring network activities
b. Buying the latest security solutions
c. Performing risk assessment
d. Implementing countermeasures

What is the term used to describe the security property that means users cannot deny knowledge of sending a message or performing some online activity at some later point in time?
Select one:
a. Integrity
b. Confidentiality
c. Availability
d. Non-repudiation

1 comment: