Cyber Mock

Cyber Mock

Professional Development

55 Qs

quiz-placeholder

Similar activities

AZ-900 Practice Test 5

AZ-900 Practice Test 5

Professional Development

51 Qs

PRINCE 2 - Sample Paper 1 (60Q)

PRINCE 2 - Sample Paper 1 (60Q)

Professional Development

60 Qs

DISTRIBUTED SYSTEMS

DISTRIBUTED SYSTEMS

Professional Development

50 Qs

Secret Private Quiz

Secret Private Quiz

Professional Development

50 Qs

Post Test Airport Security Department

Post Test Airport Security Department

Professional Development

50 Qs

Day 1 Remote Training

Day 1 Remote Training

Professional Development

50 Qs

3DX5X Important UREs Vol 1&2

3DX5X Important UREs Vol 1&2

Professional Development

56 Qs

ISO 45001 internal audit standards practice exam

ISO 45001 internal audit standards practice exam

Professional Development

52 Qs

Cyber Mock

Cyber Mock

Assessment

Quiz

Other

Professional Development

Hard

Created by

Michaela Flowers

Used 1+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


Which of the following techniques is used to ensure confidentiality?

Encryption

Hashing

Encapsulation

Authentication

Answer explanation

Encryption is used as it converts plain text to cipher text and vice versa.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be defined as a threat?

The likelihood of a cybercriminal getting caught

The likelihood of a cybercriminal getting caught

The probability that a cyber attack will be successful

The probability that a cyber attack will be successful

Answer explanation

A threat is a communicated intent to inflict harm or loss on another person.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the function of specifying user access rights/privileges to computing resources? 

Authentication

Enabling

Accounting

Duplication

Answer explanation

Enabling is the authority or means to do something; make it possible for a user to access a computing resource.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept describes the amount of confidence that an organisation has that its controls satisfy the necessary security requirements?

Assurance

Governance

Non-repudiation

Trust

Answer explanation

Assurance is defined as a positive declaration intended to give confidence; a promise.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which information security principle requires that an organisation SHOULD implement overlapping security controls wherever feasibly possible?

Separation of Duties

Fail Safe Configuration

Fail Safe Configuration

Web of Trust

Answer explanation

Defence in depth is a concept used in Information security in which multiple layers of security controls are placed throughout an information technology system.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

With the increasing global operation of many corporate organisations, which of the following is LIKELY to be the more important consideration with respect to information security?

Understanding that different countries have differing legislation with respect to how information can be handled

Ensuring that for all countries that an organisation has an office in, will all operate in the same time zone

Ensuring that regional preferences for security related hardware and software are adhered to

Storing all corporate data only in one country where an organisations central office is located

Answer explanation

As legislation is likely to vary between countries it must be the most important consideration.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Whilst drafting a company's information security policy, what would be an important consideration?

The policy should be a standalone document

The policy must be integral to all areas of an organisation

The policy should only be visible to senior management

The policy only applies to staff handling confidential information

Answer explanation

A company policy should apply to all areas of an organisation.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?