About     Donate     Endpoint     F.A.Q.     Privacy     Sales     Status     T.O.S.     Contact     Boring background Dark background OG background Cyber background


Practice Quiz

This quiz simulation covers the concepts you need to know to pass cybersecurity exams and certifications. See how you measure up with these 20 random questions.
 

  1) Which is concerned with identifying the root cause but also addressing the underlying issue?
   Change management
   Incident management
   Configuration management
   Problem management
 
  2) A way to defeat frequency analysis as a method to determine the key is to use what?
   Inversion ciphers
   Transposition ciphers
   Substitution ciphers
   Confusion
 
  3) Security awareness training includes?
   Legislated security compliance objectives
   Security roles and responsibilities for staff
   The high-level outcome of vulnerability assessments
   Specialized curriculum assignments, coursework and an accredited institution
 
  4) Technical evaluation of assurance to ensure that security requirements have been met is known as?
   Accreditation
   Evaluation
   Validation
   Verfication
 
  5) Security is likely to be most expensive when addressed in which phase?
   Implementation
   Testing
   Design
   Prototyping
 
  6) Which one is the most common security threat with IoT devices?
   Logical Network Segmentation
   Lack of device management
   Lack of system updates against a new vulnerability
   Backdoor
 
  7) The best way to ensure that no data remanence of sensitive information that was stored on a DVD-R media is by
   Deletion
   Destruction
   Overwritting
   Degaussing
 
  8) A SOC Type 2 report commonly covers what?
   9-month period
   12-month period
   18-month period
   Minimum of 6-month period
 
  9) Who is accountable for implementing information security?
   Everyone
   Senior management
   Security officer
   Data owners
 
  10) Single loss expectancy (SLE) is calculated by using?
   Asset value and annualized rate of occurrence (ARO)
   Asset value, local annual frequency estimate (LAFE), and standard annual frequency estimate (SAFE)
   Asset value and exposure factor
   Local annual frequency estimate and annualized rate of occurrence
 
  11) Which of the following is not addressed by the data retention policy?
   What data to keep
   For whom data is kept
   How long data is kept
   Where data is kept
 
  12) Which of the following is not true about continuous monitoring?
   It involves ad hoc processes that provide agility in responding to novel attacks
   Its main goal is to support organizational risk management
   It helps determine whether security controls remain effective
   It relies on carefully chosen metrics and measurements
 
  13) The elements of risk are?
   Threats, assets and vulnerabilities
   Risk and business impact analysis
   Business impact analysis and mitigating controls
   Natural disasters and man-made disasters
 
  14) What is the process of making digital data unreadable to unauthorized users?
   VPN
   Encryption
   FTP
   Deserialization
 
  15) Before applying a software update to production systems, it is most important that
   The patching is documented
   The systems are backed up
   Full information about the threat that the patch addresses is available
   An independent third-party attests the validity of the patch
 
  16) What is optimal placement for network based intrusion detection system (NIDS)?
   External Service Provider
   Network Operation Center (NOC)
   Network segments with business critical systems (DMZ) and certain intranet segments
   Network perimeter to alert network admins of suspicious traffic
 
  17) What best describes two-factor authentication?
   A hard token and a smart card
   A user name and a PIN
   A password and a PIN
   A PIN and a hard token
 
  18) What is the term for the act of secretly observing and recording someone's keystrokes on a computer?
   Keystroking
   Keylogging
   Logkeying
   Stokelogs
 
  19) The process used in most block ciphers to increase their strength is what?
   Step function
   Diffusion
   SP-network
   Confusion
 
  20) If speed is preferred over resilience, which of the following RAID configurations is best?
   Raid 1
   Raid 10
   Raid 5
   Raid 0
 
 
© 2024 Black Cat White Hat Security L.L.C. - All rights reserved. - Application Version: 4D.65.6F.77