About     Donate     Endpoint     F.A.Q.     Privacy     Sales     Status     T.O.S.     Contact     Boring background Dark background OG background Cyber background


Practice Quiz

This quiz simulation covers the concepts you need to know to pass cybersecurity exams and certifications. See how you measure up with these 20 random questions.
 

  1) Technical evaluation of assurance to ensure that security requirements have been met is known as?
   Accreditation
   Evaluation
   Validation
   Verfication
 
  2) If speed is preferred over resilience, which of the following RAID configurations is best?
   Raid 1
   Raid 10
   Raid 5
   Raid 0
 
  3) Which is concerned with identifying the root cause but also addressing the underlying issue?
   Change management
   Incident management
   Configuration management
   Problem management
 
  4) When receiving an email from an unknown contact that has an attachment, you should:
   Open the attachment and view the contents
   Delete the email
   Report the email as Phishing
   Forward to your personal email
 
  5) Before applying a software update to production systems, it is most important that
   The patching is documented
   The systems are backed up
   Full information about the threat that the patch addresses is available
   An independent third-party attests the validity of the patch
 
  6) Which of the following best determines access of an individual?
   Role
   Clearance
   Partnership with security team
   Job rank or title
 
  7) What is optimal placement for network based intrusion detection system (NIDS)?
   External Service Provider
   Network Operation Center (NOC)
   Network segments with business critical systems (DMZ) and certain intranet segments
   Network perimeter to alert network admins of suspicious traffic
 
  8) Many privacy laws dictate which of the following rules?
   Individuals have a right to remove any data they do not want others to know
   Agencies do not need to ensure that the data is accurate
   Agencies need to allow all government agencies access to the data
   Agencies cannot use collected data for a purpose different from what they were collected for
 
  9) Formal acceptance of an evaluated system by management is known as what?
   Authorization
   Verification
   Certification
   Validation
 
  10) A botnet can be characterized as?
   An network used solely for internal communications
   An automatic security alerting tool for corporate networks
   A group of dispersed, compromised machines controlled remotely for illicit reasons
   A type of virus
 
  11) Security is likely to be most expensive when addressed in which phase?
   Implementation
   Testing
   Design
   Prototyping
 
  12) Who should receive business continuity plan training in an organization?
   Those with specific business continuity roles
   First responders
   Senior executives
   Everyone
 
  13) A disadvantage of single sign-on is?
   Consistent time-out enforcement across platforms
   A compromised password exposes all authorized resources
   Use of multiple passwords to remember
   Password change control
 
  14) What is the term for the act of secretly observing and recording someone's keystrokes on a computer?
   Keystroking
   Keylogging
   Logkeying
   Stokelogs
 
  15) A way to defeat frequency analysis as a method to determine the key is to use what?
   Inversion ciphers
   Transposition ciphers
   Substitution ciphers
   Confusion
 
  16) What is the right time to plan for security?
   Pre-deployment
   Post-deployment
   Testing Phase
   Monitoring Phase
 
  17) Tactical security plans are best used to do what?
   Deploy new security technology
   Enable enterprise security management
   Establish high-level security policies
   Reduce downtime
 
  18) Single loss expectancy (SLE) is calculated by using?
   Asset value and annualized rate of occurrence (ARO)
   Asset value, local annual frequency estimate (LAFE), and standard annual frequency estimate (SAFE)
   Asset value and exposure factor
   Local annual frequency estimate and annualized rate of occurrence
 
  19) Which is a disadvantage of biometrics?
   Encryption
   Placement
   Communications
   User acceptance
 
  20) The best way to ensure that no data remanence of sensitive information that was stored on a DVD-R media is by
   Deletion
   Destruction
   Overwritting
   Degaussing
 
 
© 2024 Black Cat White Hat Security L.L.C. - All rights reserved. - Application Version: 4D.65.6F.77