Test your Cyber skill

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

Start Quiz
Question 1 / 14

Which is the best example of a denial-of-service (DoS) attack?

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

A use case is _________

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

For a certain system, our backup policy is doing full monthly backups and differential weekly backups. All backups are started at Sunday midnight. We are thinking about changing it to no more than 48 hours of data loss and restores with only 2 tapes. What would we need to do what?

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

Which of the following is not part of physical access control?

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

CCTV systems consist of sensors, control units, transmission lines and monitor units

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

Which of the following is NOT addressed by data retention standards?

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

Which of the following includes security standards for health information?

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

Which cloud deployment model do companies have total control on development and delivery of cloud services?

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

An organization is implementing a security solution that attempts to guarantee the identity of the person sending the data from one point to another. Which of the following best describes this implementation?

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

What is the Internet Of Things (IoT)?

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

Who are offensive security professionals, experts in attacking systems and breaking into deffences?

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

The categories of risk treatment are:

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

Which of the following is an first level security control?

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

While working as a contractor for XYZ Co, you are asked what the weakest form of authentication is. What will you say?

close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox

answered 0/

Result

0%

Passing grade - 70%
close

SUBSCRIBE

Subscribe for weekly updates
directly in your inbox