Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1

Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1

Professional Development

101 Qs

quiz-placeholder

Similar activities

IS202 - Midterm Sy2022 - 2023

IS202 - Midterm Sy2022 - 2023

Professional Development

100 Qs

CCNA Prep Simulation

CCNA Prep Simulation

Professional Development

103 Qs

CompTIA Net+ Practice (set A)

CompTIA Net+ Practice (set A)

Professional Development

100 Qs

AWS Certified Solutions Architect Associate (VPC)

AWS Certified Solutions Architect Associate (VPC)

Professional Development

99 Qs

AWS SA Class 2

AWS SA Class 2

Professional Development

99 Qs

march2024 monthly test

march2024 monthly test

Professional Development

100 Qs

Information Security Quiz

Information Security Quiz

Professional Development

100 Qs

ICTSM SEM-4 MOD1-4

ICTSM SEM-4 MOD1-4

Professional Development

100 Qs

Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1

Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Kim undefined

Used 1+ times

FREE Resource

101 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a system, Alice, a programmer, attempts to access a code repository. In terms of access control, how would Alice and the code repository be classified?

Alice is the object, the code repository is the subject

Alice is the subject, the code repository is the object

Both Alice and the code repository are subjects

Both Alice and the code repository are objects

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As an IT manager at a financial institution, you are designing a system to ensure that any transaction made cannot be denied by the party making it. This security measure is known as:

Confidentiality

Non-repudiation

Authorization

Encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a financial company, a system requires both the manager and the accountant to simultaneously use their access codes to transfer funds exceeding $10,000. What security concept does this scenario illustrate?

Defense in depth

Principle of least privilege

Two-person integrity

Mandatory Access Control (MAC)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You've just discovered that an unknown attacker has obtained unauthorized access to your company's client database. This situation is best defined as:

Exploit

Breach

Intrusion

Zero Day

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT team at XYZ Corp is working on identifying potential threats to their network. They are also assessing the impact of these threats and planning how to respond if any of these threats occur. What is the IT team engaged in?

Risk Management

Incident Response

Asset Management

Compliance Management

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of user authentication, which factors typically fall under the categories of "something you are" and "something you have"?

Username and password

Fingerprint and mobile phone

Security questions and PIN

Smart card and email address

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company implements multiple layers of security controls, including firewalls, intrusion detection systems, encryption, and regular security awareness training for employees. This approach is an example of:

Defense in Depth

Least Privilege

Separation of Duties

Single Sign-On

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?