CSF-PT05Q1

CSF-PT05Q1

Professional Development

15 Qs

quiz-placeholder

Similar activities

CB-Quiz On AWS_IAM USER

CB-Quiz On AWS_IAM USER

Professional Development

20 Qs

Chapter 10: Incident Detection and Analysis

Chapter 10: Incident Detection and Analysis

Professional Development

20 Qs

Speed Quiz TCBian Visit

Speed Quiz TCBian Visit

Professional Development

10 Qs

Cybersecurity Core Functions

Cybersecurity Core Functions

Professional Development

15 Qs

Exam Prep 2

Exam Prep 2

Professional Development

20 Qs

Cloud Practitioner Essentials Quiz

Cloud Practitioner Essentials Quiz

Professional Development

10 Qs

CSS National Training TechPro Class 1

CSS National Training TechPro Class 1

Professional Development

15 Qs

CSF-PT05Q1

CSF-PT05Q1

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Daisy Machoka

Used 8+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which security principle focuses on ensuring that data cannot be altered without authorization?

Confidentiality

Integrity

Availability

Authentication

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of a physical security control?

Firewalls

Encryption

Turnstiles

Antivirus

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main advantage of using Single Sign-On (SSO)?

It requires multiple passwords for increased security

It provides a higher level of encryption for data

It ensures that users have minimal access rights

It simplifies user authentication by allowing access to multiple applications with one set of credentials

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which device is primarily used to filter and monitor network traffic, both incoming and outgoing, according to predefined security rules?

Switch

Router

Firewall

Hub

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary function of a Virtual Private Network (VPN)?

To increase internet speed

To provide secure remote access to a network

To monitor network traffic

To detect malware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a common method for preventing DDoS attacks?

Implementing strong passwords

Using intrusion detection systems (IDS)

Employing network firewalls

Deploying rate limiting and traffic analysis

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of attack involves intercepting and possibly modifying communication between two parties without their awareness?

Phishing

Man-in-the-Middle (MitM)

Denial of Service (DoS)

SQL Injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?