About     Donate     Endpoint     F.A.Q.     Privacy     Sales     Status     T.O.S.     Contact     Boring background Dark background OG background Cyber background


Practice Quiz

This quiz simulation covers the concepts you need to know to pass cybersecurity exams and certifications. See how you measure up with these 20 random questions.
 

  1) A disadvantage of single sign-on is?
   Consistent time-out enforcement across platforms
   A compromised password exposes all authorized resources
   Use of multiple passwords to remember
   Password change control
 
  2) The best way to ensure that no data remanence of sensitive information that was stored on a DVD-R media is by
   Deletion
   Destruction
   Overwritting
   Degaussing
 
  3) Which of the following is not true about continuous monitoring?
   It involves ad hoc processes that provide agility in responding to novel attacks
   Its main goal is to support organizational risk management
   It helps determine whether security controls remain effective
   It relies on carefully chosen metrics and measurements
 
  4) Which of the following best determines access of an individual?
   Role
   Clearance
   Partnership with security team
   Job rank or title
 
  5) Security awareness training includes?
   Legislated security compliance objectives
   Security roles and responsibilities for staff
   The high-level outcome of vulnerability assessments
   Specialized curriculum assignments, coursework and an accredited institution
 
  6) Who should receive business continuity plan training in an organization?
   Those with specific business continuity roles
   First responders
   Senior executives
   Everyone
 
  7) The process used in most block ciphers to increase their strength is what?
   Step function
   Diffusion
   SP-network
   Confusion
 
  8) What is the right time to plan for security?
   Pre-deployment
   Post-deployment
   Testing Phase
   Monitoring Phase
 
  9) Business impact analysis is performed to best identify what?
   Exposure to loss the organization faces
   Impacts of a threat to the organization operations
   Cost-effcient way to eliminate threats
   Impacts of a risk to the organization
 
  10) When selecting a security testing method or tool, the practitioner needs to consider many different things, such as:
   Surface and supported technology
   Security roles and responsibilities for staff
   Culture of the organization and likelihood of exposure
   Local annual frequency estimate and standard annual frequency estimate
 
  11) Which of the following is a security risk of wireless LANs?
   War driving
   Demonstrable insecure standards
   Lack of physical access control
   Implementation weakness
 
  12) Which is a disadvantage of biometrics?
   Encryption
   Placement
   Communications
   User acceptance
 
  13) Which is concerned with identifying the root cause but also addressing the underlying issue?
   Change management
   Incident management
   Configuration management
   Problem management
 
  14) The key to a successful physical protection system is the integration of what?
   Technology, risk assessment and human interaction
   Detection, deterrence and response
   Protecting, offsetting and transferring rest
   People, procedures and equipment
 
  15) Security is likely to be most expensive when addressed in which phase?
   Implementation
   Testing
   Design
   Prototyping
 
  16) Technical evaluation of assurance to ensure that security requirements have been met is known as?
   Accreditation
   Evaluation
   Validation
   Verfication
 
  17) The running key cipher is based on what?
   Modular math
   Exponentiation
   Substitution cipher
   XOR math
 
  18) Which one is the most common security threat with IoT devices?
   Logical Network Segmentation
   Lack of device management
   Lack of system updates against a new vulnerability
   Backdoor
 
  19) Which phase best defines a business disaster recovery plan?
   An approved set of preparations and procedures for responding to a disaster
   A set of plans for preventing a disaster
   The adequate preparation and procedures for the continuation of all organization functions
   A set of preparations and procedures for responding to a disaster without management approval
 
  20) Which of the following is not addressed by the data retention policy?
   What data to keep
   For whom data is kept
   How long data is kept
   Where data is kept
 
 
© 2024 Black Cat White Hat Security L.L.C. - All rights reserved. - Application Version: 4D.65.6F.77