Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1

Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1

Professional Development

101 Qs

quiz-placeholder

Similar activities

EXAMEN SIMULACRO

EXAMEN SIMULACRO

Professional Development

100 Qs

TGF1

TGF1

Professional Development

100 Qs

Security Quiz Chapter 12

Security Quiz Chapter 12

Professional Development

100 Qs

IBM Cloud Advocate v2 Certification Practice Exam - 1

IBM Cloud Advocate v2 Certification Practice Exam - 1

Professional Development

98 Qs

Test Level 1 Basic Computer + Internet

Test Level 1 Basic Computer + Internet

Professional Development

100 Qs

ÔN TẬP IC3

ÔN TẬP IC3

Professional Development

100 Qs

Calculatoare și rețele de calculatoare

Calculatoare și rețele de calculatoare

Professional Development

100 Qs

QUIZZ JAM TAMBAHAN 2 - TEORI KEJURUAN TKJ

QUIZZ JAM TAMBAHAN 2 - TEORI KEJURUAN TKJ

KG - Professional Development

100 Qs

Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1

Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Kim undefined

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

101 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a system, Alice, a programmer, attempts to access a code repository. In terms of access control, how would Alice and the code repository be classified?

Alice is the object, the code repository is the subject

Alice is the subject, the code repository is the object

Both Alice and the code repository are subjects

Both Alice and the code repository are objects

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As an IT manager at a financial institution, you are designing a system to ensure that any transaction made cannot be denied by the party making it. This security measure is known as:

Confidentiality

Non-repudiation

Authorization

Encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a financial company, a system requires both the manager and the accountant to simultaneously use their access codes to transfer funds exceeding $10,000. What security concept does this scenario illustrate?

Defense in depth

Principle of least privilege

Two-person integrity

Mandatory Access Control (MAC)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You've just discovered that an unknown attacker has obtained unauthorized access to your company's client database. This situation is best defined as:

Exploit

Breach

Intrusion

Zero Day

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT team at XYZ Corp is working on identifying potential threats to their network. They are also assessing the impact of these threats and planning how to respond if any of these threats occur. What is the IT team engaged in?

Risk Management

Incident Response

Asset Management

Compliance Management

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of user authentication, which factors typically fall under the categories of "something you are" and "something you have"?

Username and password

Fingerprint and mobile phone

Security questions and PIN

Smart card and email address

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company implements multiple layers of security controls, including firewalls, intrusion detection systems, encryption, and regular security awareness training for employees. This approach is an example of:

Defense in Depth

Least Privilege

Separation of Duties

Single Sign-On

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?