Search Header Logo

Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1

Authored by Kim undefined

Computers

Professional Development

Used 1+ times

Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

101 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a system, Alice, a programmer, attempts to access a code repository. In terms of access control, how would Alice and the code repository be classified?

Alice is the object, the code repository is the subject

Alice is the subject, the code repository is the object

Both Alice and the code repository are subjects

Both Alice and the code repository are objects

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As an IT manager at a financial institution, you are designing a system to ensure that any transaction made cannot be denied by the party making it. This security measure is known as:

Confidentiality

Non-repudiation

Authorization

Encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a financial company, a system requires both the manager and the accountant to simultaneously use their access codes to transfer funds exceeding $10,000. What security concept does this scenario illustrate?

Defense in depth

Principle of least privilege

Two-person integrity

Mandatory Access Control (MAC)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You've just discovered that an unknown attacker has obtained unauthorized access to your company's client database. This situation is best defined as:

Exploit

Breach

Intrusion

Zero Day

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT team at XYZ Corp is working on identifying potential threats to their network. They are also assessing the impact of these threats and planning how to respond if any of these threats occur. What is the IT team engaged in?

Risk Management

Incident Response

Asset Management

Compliance Management

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of user authentication, which factors typically fall under the categories of "something you are" and "something you have"?

Username and password

Fingerprint and mobile phone

Security questions and PIN

Smart card and email address

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company implements multiple layers of security controls, including firewalls, intrusion detection systems, encryption, and regular security awareness training for employees. This approach is an example of:

Defense in Depth

Least Privilege

Separation of Duties

Single Sign-On

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?