Cisco CCST Objective 1

Cisco CCST Objective 1

12th Grade

10 Qs

quiz-placeholder

Similar activities

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

IT Security Threats

IT Security Threats

10th - 12th Grade

11 Qs

Cyber Security Unit 2 Exam

Cyber Security Unit 2 Exam

12th Grade

15 Qs

Cybersecurity Quiz for Tech Integrators

Cybersecurity Quiz for Tech Integrators

12th Grade

10 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Security Controls

Security Controls

12th Grade

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

Cisco CCST Objective 1

Cisco CCST Objective 1

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Brian Nanns

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines a vulnerability in cybersecurity?

A. An action that causes damage to a system.

B. A weakness that can be exploited by threats.

C. A protective measure against cyberattacks.

D. A process for encrypting sensitive data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three components of the CIA Triad?

Confidentiality, Integrity, and Availability.

Control, Identification, and Authorization.

Cryptography, Intrusion Detection, and Access Control.

Compliance, Inspection, and Authentication.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves sending deceptive emails to trick users into revealing sensitive information?

Phishing

Denial of Service (DoS)

Brute Force Attack

Man-in-the-Middle Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle refers to applying multiple layers of security controls to protect systems?

A. Principle of Least Privilege

B. Zero Trust Security

C. Defense-in-Depth

D. Single Sign-On

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of hardening a system?

To remove outdated hardware components

To make a system more resilient against attacks

To allow external users easier access

To decrease the complexity of security controls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an insider threat?

A. A hacker using brute force to guess passwords.

B. An employee leaking confidential data to competitors.

C. A botnet performing a denial-of-service attack.

D. A phishing attack targeting an organization's employees.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes an Advanced Persistent Threat (APT)?

A. A short-lived attack that exploits system misconfigurations.

B. A low-level threat that affects individual devices.

C. A continuous, stealthy attack by a skilled adversary.

D. A ransomware attack that encrypts data and demands payment.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?