Saturday, April 8, 2017

Cybersecurity Quiz

Generic Category (English)300x250

Which of the following may not be a component of a national cyber security strategy?

Select one:
a. Reviewing laws and policies related to cyber
b. Developing best practices for critical infrastructure
c. Promoting security awareness to citizens
d. Limiting internet usage and access to the citizens

In risk management, implementing counter measures such as enabling firewall or running security awareness campaigns is an example of

Select one:
a. Risk Analysis
b. Risk Mitigation
c. Risk Transfer
d. Risk Assessment

What is the term used to describe the potential for a security breach?

Select one:
a. Motive
b. Counter-measure
c. Threat
d. Vulnerability

IT Certification Category (French)728x90

Which one of the following is not considered good practice when managing passwords?

Select one:
a. the password should be long and complex enough to make it difficult for someone else to guess
b. the password should be sent in plaintext by email
c. the password should not be shared with others
d. the password should be stored and transmitted securely

Which of the following countermeasure describes what must be done to protect the business and its information assets?

Select one:
a. Security Policy
b. Intrusion Detection
c. Firewall
d. Risk Assessment

Information classification policies normally can be enforced by which of the following security controls?

Select one:
a. Intrusion Detection System
b. Anti-malware
c. Encryption
d. Firewall

Mobile Apps Category (English)728x90

The primary impact of a distributed denial of service attack is on which of the following security objectives

Select one:
a. Confidentiality
b. Safety
c. Integrity
d. Availability

In an organization, positive security culture and awareness can be achieved by which of the following approach?

Select one:
a. Vulnerability and Patch Management
b. Monitoring network activities
c. Risk Management
d. Security Awareness Campaigns

Development Category (English)728x90

Which of the following activities is related to the vulnerability management

Select one:
a. Updating antivirus software signature
b. Enforcing VPN usage on corporate users
c. Applying new firewall rules
d. Applying security patches

The property of safeguarding the accuracy and completeness of information assets is also known as

Select one:
a. Confidentiality
b. Availability
c. Integrity
d. Consistency   Career Category (English)728x90

9 comments:

  1. The property of safeguarding the accuracy and completeness of information assets is also known as

    Select one:
    a. Confidentiality
    b. Availability
    c. Integrity
    d. Consistency

    ReplyDelete
  2. C. accurate and complete which means things have not been modified and is complete.

    ReplyDelete
  3. Where is the answer of those Question?

    ReplyDelete
  4. The primary impact of a distributed denial of service attack is on which of the following security objectives


    d. Availability

    ReplyDelete
  5. Which one of the following is not considered good practice when managing passwords?

    b. the password should be sent in plaintext by email

    ReplyDelete
  6. This comment has been removed by the author.

    ReplyDelete
  7. What is the answer of the following question ?

    The primary impact of a distributed denial of service attack is on which of the following security objectives

    Safety
    Availability
    Integrity
    Confidentiality
    Which one of the following is not considered good practice when managing passwords?

    the password should not be shared with others
    the password should be stored and transmitted securely
    the password should be long and complex enough to make it difficult for someone else to guess
    the password should be sent in plaintext by email
    In an organization, positive security culture and awareness can be achieved by which of the following approach?

    Monitoring network activities
    Vulnerability and Patch Management
    Security Awareness Campaigns
    Risk Management
    In risk management, implementing counter measures such as a firewall or running security awareness campaigns are an example of

    Risk Mitigation
    Risk Analysis
    Risk Assessment
    Risk Transfer
    Tricking users to give away their login credentials is an example of

    Malware
    Phishing
    Denial of Service
    Password Sniffing
    Impersonating a user to gain access to systems accessible to that user is an example of

    Email Spoofing
    Social Engineering
    Identity Theft
    Email Theft
    Which of the following is not affected by a web defacement incident?

    Server uptime
    Information Availability
    Organization's reputation
    Information Integrity
    Upon infection, what a malware does is dependent on the

    Trojan
    Worm
    Exploit Kit
    Payload

    ReplyDelete