Saturday, April 8, 2017

CyberSecurity Quiz

Which of the following can mitigate the risk of identity theft attacks?

Select one:
a. Two Factor Authentication
b. Firewall
c. Patch Management
d. Intrusion Detection System

IT Certification Category (French)728x90

Using a managed security service provider to detect and analyze security threats is an example of which risk management approach?

Select one:
a. Risk Analysis
b. Risk Mitigation
c. Risk Acceptance
d. Risk Transfer

Impersonating a user to gain access to systems accessible to that user is an example of

Select one:
a. Identity Theft
b. Social Engineering
c. Email Spoofing
d. Password Stealing

Which of the following security controls do not rely on encryption to protect information?

Select one:
a. Virtual Private Network (VPN)
b. Secure Shell (SSH)
c. Pretty Good Privacy (PGP)
d. Intrusion Detection System (IDS)

Which of the following entities is responsible for investigating and prosecuting criminal acts online?

Select one:
a. National Computer Emergency Response Team
b. Law Enforcement Agency
c. Regional Internet Registry
d. Network Operators

Mobile Apps Category (English)728x90

To an organization, systems that can no longer be patched with security fixes can be considered as:

Select one:
a. Vulnerability
b. Loophole
c. Threat
d. Risk

Which of the following is ultimately responsible for formulating the security strategy and making sure that resources are allocated for the organization-wide security program?

Select one:
a. Top Management
b. Penetration Tester
c. Security Auditor
d. Security Analyst

Development Category (English)728x90

What is the term used to describe the security property that means the information must be accessible to an authorized entity when needed?
Select one:
a. Availability
b. Integrity
c. Accuracy
d. Confidentiality

Which of the following roles normally deal with data recovery and examination after a security breach?

Select one:
a. Security Auditor
b. Digital Forensics Analyst
c. Network Engineers
d. Penetration Tester

Social engineering attacks can be greatly reduced through which of the following countermeasures?

Select one:
a. Intrusion Detection
b. Encryption
c. Firewall
d. Security Awareness Training   Career Category (English)728x90

No comments:

Post a Comment