Saturday, April 8, 2017

Cybersecurity Quiz

Upon infection, what a malware does is dependent on the

Select one:
a. Payload
b. Trojan
c. Worm
d. Exploit Kit

Which of the following entities provide internet access by routing packets and announcing routes to other networks?

Select one:
a. Network Operators
b. Domain Name Registry
c. Regional Internet Registry
d. Domain Name Systems

Development Category (English)728x90

Which of the following controls can be used to protect data that is traversing the network?

Select one:
a. Virtual Private Network (VPN)
b. Firewall
c. Intrusion Detection System
d. Anti Virus Software

Limiting access to information on the need to know basis is an example of:

Select one:
a. Principle of the Least Privilege
b. Principle of Access Control
c. The principle of the weakest link
d. Denial of Service

Tricking users to give away their login credentials is an example of

Select one:
a. Malware
b. Password Sniffing
c. Denial of Service
d. Phishing

Which of the following can affect the integrity of data and information?

Select one:
a. Phishing
b. Unauthorized Modification
c. Denial of Service
d. Unauthorized Shutdown

Deploying a firewall is an example of which security control category?

Select one:
a. Policy
b. Technical
c. Virtual
d. Physical

Career Category (English)728x90

Which of the following role is responsible for making sure that the web application is not subjected to attacks as SQL injection or Cross-Site Scripting?

Select one:
a. Security Analyst
b. Software Developer
c. Network Engineer
d. Security Auditor

Which of the following is an implementation of the principle of least privilege?

Select one:
a. Applying security patches to the operating system
b. Enforcing TLS/SSL on the web server
c. Performing regular security scanning on internal systems
d. Limiting what a user is able to read or execute on a system

Which of the following is not affected by a web defacement incident?

Select one:
a. Information Integrity
b. Information Availability
c. Organization's reputation
d. Server uptime 

No comments:

Post a Comment