This blog contains notes from different learning sites. This notes falls in Information Security, Cyber Security, Network Security and other Security Domain class. Any suggestion to make this site helpful is truly welcome :)
Saturday, April 8, 2017
Cybersecurity Quiz
Which of the following may not be a component of a national cyber security strategy?
Select one:
a. Reviewing laws and policies related to cyber
b. Developing best practices for critical infrastructure
c. Promoting security awareness to citizens
d. Limiting internet usage and access to the citizens
In risk management, implementing counter measures such as enabling firewall or running security awareness campaigns is an example of
Select one:
a. Risk Analysis
b. Risk Mitigation
c. Risk Transfer
d. Risk Assessment
What is the term used to describe the potential for a security breach?
Select one:
a. Motive
b. Counter-measure
c. Threat
d. Vulnerability
Which one of the following is not considered good practice when managing passwords?
Select one:
a. the password should be long and complex enough to make it difficult for someone else to guess
b. the password should be sent in plaintext by email
c. the password should not be shared with others
d. the password should be stored and transmitted securely
Which of the following countermeasure describes what must be done to protect the business and its information assets?
Select one:
a. Security Policy
b. Intrusion Detection
c. Firewall
d. Risk Assessment
Information classification policies normally can be enforced by which of the following security controls?
Select one:
a. Intrusion Detection System
b. Anti-malware
c. Encryption
d. Firewall
The primary impact of a distributed denial of service attack is on which of the following security objectives
Select one:
a. Confidentiality
b. Safety
c. Integrity
d. Availability
In an organization, positive security culture and awareness can be achieved by which of the following approach?
Select one:
a. Vulnerability and Patch Management
b. Monitoring network activities
c. Risk Management
d. Security Awareness Campaigns
Which of the following activities is related to the vulnerability management
Select one:
a. Updating antivirus software signature
b. Enforcing VPN usage on corporate users
c. Applying new firewall rules
d. Applying security patches
The property of safeguarding the accuracy and completeness of information assets is also known as
Select one:
a. Confidentiality
b. Availability
c. Integrity
d. Consistency
Subscribe to:
Post Comments (Atom)
The property of safeguarding the accuracy and completeness of information assets is also known as
ReplyDeleteSelect one:
a. Confidentiality
b. Availability
c. Integrity
d. Consistency
b
DeleteC. accurate and complete which means things have not been modified and is complete.
ReplyDeleteWhere is the answer of those Question?
ReplyDeleteThe primary impact of a distributed denial of service attack is on which of the following security objectives
ReplyDeleted. Availability
Which one of the following is not considered good practice when managing passwords?
ReplyDeleteb. the password should be sent in plaintext by email
This comment has been removed by the author.
ReplyDeleteWhat is the answer of the following question ?
ReplyDeleteThe primary impact of a distributed denial of service attack is on which of the following security objectives
Safety
Availability
Integrity
Confidentiality
Which one of the following is not considered good practice when managing passwords?
the password should not be shared with others
the password should be stored and transmitted securely
the password should be long and complex enough to make it difficult for someone else to guess
the password should be sent in plaintext by email
In an organization, positive security culture and awareness can be achieved by which of the following approach?
Monitoring network activities
Vulnerability and Patch Management
Security Awareness Campaigns
Risk Management
In risk management, implementing counter measures such as a firewall or running security awareness campaigns are an example of
Risk Mitigation
Risk Analysis
Risk Assessment
Risk Transfer
Tricking users to give away their login credentials is an example of
Malware
Phishing
Denial of Service
Password Sniffing
Impersonating a user to gain access to systems accessible to that user is an example of
Email Spoofing
Social Engineering
Identity Theft
Email Theft
Which of the following is not affected by a web defacement incident?
Server uptime
Information Availability
Organization's reputation
Information Integrity
Upon infection, what a malware does is dependent on the
Trojan
Worm
Exploit Kit
Payload
payload
Delete