0% found this document useful (0 votes)
109 views3 pages

Entry-Level 10questions Answers Rationale SnapApp

This document contains a 10 question practice quiz for cybersecurity certification. The questions cover topics such as risk avoidance, non-repudiation, disaster recovery strategies, access control concepts like subjects and objects, common network devices, security policy publication, and security baselines. The quiz provides the question, multiple choice answers, and the correct answer explanation for each question.

Uploaded by

Viajoloko Loko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views3 pages

Entry-Level 10questions Answers Rationale SnapApp

This document contains a 10 question practice quiz for cybersecurity certification. The questions cover topics such as risk avoidance, non-repudiation, disaster recovery strategies, access control concepts like subjects and objects, common network devices, security policy publication, and security baselines. The quiz provides the question, multiple choice answers, and the correct answer explanation for each question.

Uploaded by

Viajoloko Loko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Practice Quiz

Certified in Cybersecurity Practice Quiz

1. Is it possible to avoid risk?
A. Yes
B. No
C. Sometimes
D. Never

The correct answer is A. To avoid an identified risk, stop doing what you have identified as
being too risky or dangerous and not acceptable to the organization.

2. What is meant by non-repudiation?


A. If a user does something, they can’t later claim that they didn’t do it.
B. Controls to protect the organization’s reputation from harm due to inappropriate social
media postings by employees, even if on their private accounts and personal time.
C. It is part of the rules set by administrative controls.
D. It is a security feature that prevents session replay attacks.

The correct answer is A. To repudiate means to attempt to deny after the fact, to lie about
one’s actions.

3. Which of the following is very likely to be used in a disaster recovery effort?


A. Guard dogs
B. Data backups
C. Contract personnel
D. Antimalware solutions

The correct answer is B. Restoring from backups is often very useful during a DR effort.

4. Which of these components is very likely to be instrumental to any disaster recovery (DR)
effort?
A. Routers
B. Laptops

Certified in Cybersecurity Practice Quiz


1 1
Practice Quiz

C. Firewalls
D. Backups

The correct answer is D. Backups are often crucial in DR efforts, so that the normal production
environment can be restored.

5. Derrick logs on to a system in order to read a file. In this example, Derrick is the ______.
A. Subject
B. Object
C. Process
D. Predicate

The correct answer is A. Subjects are entities that access objects.

6. Which of the following is a subject?


A. A file
B. A fence
C. A filename
D. A user

The correct answer is D. A user is a subject; something trying to get access to objects.

7. Common network device used to connect networks.


A. Server
B. Endpoint
C. Router
D. Switch

The correct answer is C. Routers are used to connect networks.

8. A common network device used to filter traffic.


A. Server
B. Endpoint
C. Ethernet

Certified in Cybersecurity Practice Quiz


2 2
Practice Quiz

D. Firewall

The correct answer is D. This is the purpose of a firewall.

9. Who is responsible for publishing and signing the organization’s policies?


A. The security office
B. Human resources
C. Senior management
D. The legal department

The correct answer is C. Policies are direct organizational mandates from senior management.

10. A set of security controls or system settings used to ensure uniformity of configuration
through the IT environment.
A. Patches
B. Inventory
C. Baseline
D. Policy

The correct answer is C. This is the definition of a baseline.

Certified in Cybersecurity Practice Quiz


3 3

You might also like