0% found this document useful (0 votes)
523 views4 pages

Quiz - Secure Data and Applications - Attempt Review

The document discusses a technical introduction to cybersecurity self-paced course completed by the user, which consisted of 10 multiple choice questions covering topics like zero-day attacks, application hardening, phishing prevention, web application firewalls, digital signatures, data protection, and ransomware prevention.

Uploaded by

studiokapulana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
523 views4 pages

Quiz - Secure Data and Applications - Attempt Review

The document discusses a technical introduction to cybersecurity self-paced course completed by the user, which consisted of 10 multiple choice questions covering topics like zero-day attacks, application hardening, phishing prevention, web application firewalls, digital signatures, data protection, and ransomware prevention.

Uploaded by

studiokapulana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

 FCF - Technical Introduction to Cybersecurity 1.

0 Self-Paced
Started on Sunday, March 24, 2024, 9:02 PM
State Finished
Completed on Sunday, March 24, 2024, 9:12 PM
Time taken 9 mins 54 secs
Points 10/10
Grade 100 out of 100
Feedback Congratulations, you passed!

Question 1

Correct

1 points out of 1

Which product should a security architect use first to prevent zero-day attacks?

Select one:
Network access control (NAC)
Sandbox
Firewall
Web application firewall (WAF)

Question 2
Correct

1 points out of 1

A security engineer would like to create a browsing group policy for application hardening. Which two features should the policy include?
(Choose two.)

Select one or more:


Enable password saving
Disable auto-update
Enable pop-up blocker
Clear cookies on exit
Question 3

Correct

1 points out of 1

A security engineer must manage the devices of a large company. Which measures should they implement as part of application hardening?

Select one:
Access only through virtual private networks (VPNs)
A switch audit
An underlay network
A patch management system

Question 4

Correct

1 points out of 1

Which two recommendations should you make to a chief security officer in order to block phishing attempts and their effects? (Choose two.)

Select one or more:


Install a web application firewall (WAF).
Audit the network.
Provide security awareness training to users.
Implement email content filters.

Question 5

Correct

1 points out of 1

Which two security features are included only in the latest generation WAF? (Choose two.)

Select one or more:


Ports allow list
Data loss prevention (DLP)
Signature detection
IP reputation
Question 6
Correct

1 points out of 1

Which characteristic could a digital signature lend to a document?

Select one or more:


Non-repudiation
Encryption
Storage
Clarity

Question 7

Correct

1 points out of 1

Which two tasks should a security engineer perform to protect private data for an organization? (Choose two.)

Select one or more:


Configure Simple Network Management Protocol (SNMP) on all the switches.
Identify sensitive data and classify them.
Identify authorized roles, users, and policies.
Encrypt all the documents in the organization.

Question 8
Correct

1 points out of 1

Which component should a company implement to secure sensitive data in their internal servers?

Select one:
Virtual private network (VPN)
Real-time blackhole list (RBL)
Web application firewall (WAF)
Data loss prevention (DLP)
Question 9
Correct

1 points out of 1

Which factors should a security engineer verify to ensure an organization’s data comply with data sovereignty laws and policies?

Select one:
The audit performed on data at rest.
The risks involved in data destruction.
The laws of the nation where the data are collected.
The compliance of the organization’s in-use data.

Question 10
Correct

1 points out of 1

A chief security officer would like to prevent ransomware in their organization. Which two techniques should you recommend? (Choose two.)

Select one or more:


Use only third-party applications
Encrypt all sensitive data
Provide security awareness training to users
Apply regular patch maintenances and auto-updates

You might also like