Explore Online Courses
Free Courses
Hire from us
Become an Instructor
Reviews
All Courses
Submit
Submit
Take the Free Practice Test
Instructions:
FREE test and can be attempted multiple times.
60 Minutes
30 Multiple Choice Questions
Fill in the Details to Get Started
Select your preference
Self-learning and knowledge validation
Completed a course & revising
Just curious
By providing your contact details, you agree to our
Terms of Use
&
Privacy Policy
Welcome to your Cyber Security Quiz
____ Defines a minimum level of security that every system throughout the organization must meet.
Standards
Baselines
Guidelines
Procedures
_____ is an administrative detective control used to uncover fraudulent activities. No one person should stay in one position for a long time because they may end up having too much control over a segment of the business.
Job rotation
Dual control
Separation of duties
Split knowledge
____ Laws that the police and other law enforcement agencies concern themselves with.
Administrative law
Civil law
Criminal law
Company law
Trademarks are granted for an initial period of ___ years and can be renewed for unlimited successive ____ year periods.
15
5
20
10
____ Severely limits the ability of federal government agencies to disclose private information to other agencies without the prior written consent of the affected individual
Fourth Amendment
Privacy Act of 1974
Health Insurance Portability and Accountability Act(HIPAA)
European Union Privacy Law
In which stage of information life cycle Information will be read and modified by a variety of users.
Acquisition
Use
Archival
Disposal
Which military classification level is equal to private commercial classification level?
Confidential
Secret
Top secret
Unclassified
In _____ data roles, Any person who accesses data to accomplish work tasks.
User
Administrator
Owner
Custodian
Which of the following is a method of data handling?
Erasing
Clearing
Purging
Marking
Which of the following is data loss prevention type?
Network
End-point
Hybrid
All of the above
In which process state CPU is executing its instructions.
Ready
Running
Blocked
Stopped
How many types of hypervisors are there?
4
3
2
1
In ____ model, the user gets access to a computing platform that is typically built on a server operating system.
SaaS
PaaS
IaaS
None of the above
In _____ Data has not been altered in an unauthorized manner since it was created, transmitted, or stored.
Confidentiality
Authentication
Authorization
Integrity
____ Uses block sizes of 32, 64, or 128 bits, with key length up to 2040 bits.
RC5
Blowfish
RC4
RC6
____ layer is responsible for defining how information is presented to the user in the interface they are using.
Presentation
Network
Physical
Application
What is the port number of Telnet? 23 25 80 20
23
25
80
20
We have how many classes of IP addresses?
3
4
5
6
____ Cable is Expensive and resistant to Electromagnetic Interference (EMI).
Twisted pair
Coaxial
Fiber optic
None of the above
In ____ network topology All nodes connect to a central device such as a switch and each node has a dedicated link to the central device.
Ring
Bus
Mesh
None of the above
____ is an active entity that requests access to an object.
Access
Subject
Object
Policy
How many types of authentication factors do we have?
3
2
4
1
Which password attack is Performed with tools that cycle through many possible character, number, and symbol combinations to uncover a password.
Sniffing
Rainbow
Dictionary
Brute-force
___ is an XML standard that allows the exchange of authentication and authorization data to be shared between security domains.
SAML
SPML
SOAP
IDaaS
____ is a social engineering attack with the goal of obtaining personal information, credentials, credit card number, or financial data.
Pharming
Spear phishing
Honepot
Phishing
How many SOC report we have?
2
3
4
1
____ Probe the network for presence of known vulnerabilities.
Network Discovery Scans
Network Vulnerability Scans
Web scans
Port scans
In ____ testing, testers can target specific controls and features.
Black box
White box
Grey box
Unit testing
____ is performed to evaluate whether systems or components pass data and control correctly to one another.
Static testing
Dynamic testing
Fuzz testing
Interface testing
Test coverage = ?
use cases tested / total use cases
use cases tested * total use cases
use cases tested + total use cases
use cases tested - total use cases
Time is Up!