
ISC2 Certified in CyberSecurity Quiz -4
Authored by Nadeem M
Computers
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does TCP use to ensure a connection is established before data transfer?
SYN Flag
ACK Flag
FIN Flag
RST Flag
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the role of the traceroute command in networking?
Checks system response and accessibility
Determines the network path between systems
Creates customized ping requests
Manages exchange of communications between systems
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the significance of a network port number?
Identifies a system on a network
Encrypts network traffic
Routes information across networks
Guides traffic to specific locations on a system
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of an IP address?
Secure data transmission
Identify a system on a network
Manage network ports
Encrypt data packets
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common result of privilege creep in account management?
Increased job satisfaction
Inaccurate permissions
Efficient workflow
Enhanced collaboration
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the Principle of Least Privilege, what is the user's permission level based on?
Maximum set of permissions necessary
Average set of permissions required
Minimum set of permissions necessary
All available permissions
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which transport layer protocol is connectionless, lightweight, and does not guarantee delivery?
HTTP
UDP
TCP
IP
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?