Search Header Logo

Cisco CCST Objective 1

Authored by Brian Nanns

Computers

12th Grade

Used 10+ times

Cisco CCST Objective 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines a vulnerability in cybersecurity?

A. An action that causes damage to a system.

B. A weakness that can be exploited by threats.

C. A protective measure against cyberattacks.

D. A process for encrypting sensitive data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three components of the CIA Triad?

Confidentiality, Integrity, and Availability.

Control, Identification, and Authorization.

Cryptography, Intrusion Detection, and Access Control.

Compliance, Inspection, and Authentication.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves sending deceptive emails to trick users into revealing sensitive information?

Phishing

Denial of Service (DoS)

Brute Force Attack

Man-in-the-Middle Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle refers to applying multiple layers of security controls to protect systems?

A. Principle of Least Privilege

B. Zero Trust Security

C. Defense-in-Depth

D. Single Sign-On

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of hardening a system?

To remove outdated hardware components

To make a system more resilient against attacks

To allow external users easier access

To decrease the complexity of security controls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an insider threat?

A. A hacker using brute force to guess passwords.

B. An employee leaking confidential data to competitors.

C. A botnet performing a denial-of-service attack.

D. A phishing attack targeting an organization's employees.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes an Advanced Persistent Threat (APT)?

A. A short-lived attack that exploits system misconfigurations.

B. A low-level threat that affects individual devices.

C. A continuous, stealthy attack by a skilled adversary.

D. A ransomware attack that encrypts data and demands payment.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?