Cisco CCST Objective 1

Cisco CCST Objective 1

12th Grade

10 Qs

quiz-placeholder

Similar activities

IT Security Threats

IT Security Threats

10th - 12th Grade

11 Qs

Cyber Security Unit 2 Exam

Cyber Security Unit 2 Exam

12th Grade

15 Qs

Security Controls

Security Controls

12th Grade

10 Qs

Cybersecurity Online Threats

Cybersecurity Online Threats

9th - 12th Grade

12 Qs

Phishing and spam

Phishing and spam

9th - 12th Grade

10 Qs

Cyber Incident Quiz

Cyber Incident Quiz

12th Grade - University

15 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Cisco CCST Objective 1

Cisco CCST Objective 1

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Brian Nanns

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines a vulnerability in cybersecurity?

A. An action that causes damage to a system.

B. A weakness that can be exploited by threats.

C. A protective measure against cyberattacks.

D. A process for encrypting sensitive data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three components of the CIA Triad?

Confidentiality, Integrity, and Availability.

Control, Identification, and Authorization.

Cryptography, Intrusion Detection, and Access Control.

Compliance, Inspection, and Authentication.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves sending deceptive emails to trick users into revealing sensitive information?

Phishing

Denial of Service (DoS)

Brute Force Attack

Man-in-the-Middle Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle refers to applying multiple layers of security controls to protect systems?

A. Principle of Least Privilege

B. Zero Trust Security

C. Defense-in-Depth

D. Single Sign-On

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of hardening a system?

To remove outdated hardware components

To make a system more resilient against attacks

To allow external users easier access

To decrease the complexity of security controls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an insider threat?

A. A hacker using brute force to guess passwords.

B. An employee leaking confidential data to competitors.

C. A botnet performing a denial-of-service attack.

D. A phishing attack targeting an organization's employees.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes an Advanced Persistent Threat (APT)?

A. A short-lived attack that exploits system misconfigurations.

B. A low-level threat that affects individual devices.

C. A continuous, stealthy attack by a skilled adversary.

D. A ransomware attack that encrypts data and demands payment.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers