0 of 50 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Current
Review
Answered
Correct
Incorrect
Question 1 of 50
1 point(s)
Which methodology proceeds through a sequence of stages, with each stage being
performed before proceeding to the next stage?
Question 2 of 50
1 point(s)
Which of the following cloud deployment model is finest for the application which is
extremely scalable and can be provided on request?
Question 3 of 50
1 point(s)
Which model of cloud deployment has the least security controls?
Question 4 of 50
1 point(s)
What is the main drawback of a private cloud model?
Question 5 of 50
1 point(s)
What is the use of Security Content Automation Protocol (SCAP)?
Question 6 of 50
1 point(s)
Why is automated testing important for configuration validation?
Question 7 of 50
1 point(s)
Complete the sentence with the right answer. Alarms are useful only if:
Question 8 of 50
1 point(s)
Which of the following is the security benefit of a Faraday cage?
Question 9 of 50
1 point(s)
Which of the following is the main problem of biometrics?
Question 10 of 50
1 point(s)
Which account is used to run processes that don’t involve human interference to start or
stop?
Question 11 of 50
1 point(s)
A person who works in the IT department of the bank informs you that the tellers are
permitted to access their terminal from 9 A.M. to 5 P.M., Monday through Saturday only.
This restriction is an example of which of the following?
Question 12 of 50
1 point(s)
The process of assigning a computer ID to a particular user is identified as?
Question 13 of 50
1 point(s)
Which is not a true category of authentication factors to be used if you are developing a
new multifactor authentication system for your company?
Question 14 of 50
1 point(s)
Which one of the following passwords seems hardest to break?
Question 15 of 50
1 point(s)
The process of ensuring that every account on a mail server is owned by a valid and active
employee is known as?
Question 16 of 50
1 point(s)
What should occur when a user is no longer authorized or no longer desires to use a
system?
Question 17 of 50
1 point(s)
For managing identities across corporates and systems, the protocols, policies, and
practices are defined by which of the following?
Question 18 of 50
1 point(s)
From the following scenarios in which it is acceptable to use a shared account?
Question 19 of 50
1 point(s)
For generating a one-time password which algorithm uses the secret key with a current
timestamp?
Question 20 of 50
1 point(s)
Which access control system needs to be used in case your company wants a system to
restrict access to the files that contain sensitive information?
Question 21 of 50
1 point(s)
Which one is not a form of hardware token?
Question 22 of 50
1 point(s)
Your client wants a system that will allow them to authenticate that messages arrived from
a particular person. What authenticity providing method you might recommend them to
use?
Question 23 of 50
1 point(s)
You modify a fingerprint scanner of your company and 1 out of 50 attempts fail despite
using a valid finger. The supervisor of the company says that “1 out of 50 is good enough”.
Which of the following is described by the supervisor for the fingerprint scanner?
Question 24 of 50
1 point(s)
Which protocol can pass a symmetric key securely over the network that is insecure and
uses a key distribution?
Question 25 of 50
1 point(s)
What is the abbreviation of RADIUS?
Question 26 of 50
1 point(s)
Which of the following is allowed by OpenID Connect?
Question 27 of 50
1 point(s)
Which service permits authorization across networks & single sign-on & federated identitybased
authentication?
Question 28 of 50
1 point(s)
Which one of the following options represents the processes of adding and removing a
person to a team or project?
Question 29 of 50
1 point(s)
Which authentication factor is not regarded as “something you are”?
Question 30 of 50
1 point(s)
The requisite level of performance of a given contractual service is essentially set by which
of the following?
Question 31 of 50
1 point(s)
Which of the following is responsible for defining the characteristics like privacy, security,
and retention policies for specific information?
Question 32 of 50
1 point(s)
Which of the following policy describes what a company considers to be the proper use of
its resources (like computer policies, internet, network, and e-mail)?
Question 33 of 50
1 point(s)
Which of the following is the step-by-step instruction that describes policies
implementation steps in a corporation?
Question 34 of 50
1 point(s)
After an incident, the target time that is set for a continuation of operations is described by
which of the following term?
Question 35 of 50
1 point(s)
The security control that is used post-event for minimizing the amount of damage is?
Question 36 of 50
1 point(s)
A mantrap is an illustration of which of the following security control? (Select all that
apply.)
Question 37 of 50
1 point(s)
From the following, which one is the best explanation of ‘Risk’?
Question 38 of 50
1 point(s)
Which term describes the steps that a corporate performs after any unusual/abnormal
situation is seen in the operation of a computer system?
Question 39 of 50
1 point(s)
Which step of the incident response process involves eliminating the issue?
Question 40 of 50
1 point(s)
Which of the following site is partially configured (usually contain peripherals & software
but not every required thing)?
Question 41 of 50
1 point(s)
The backup strategy that includes only those files that have been modified since the last
full backup is?
Question 42 of 50
1 point(s)
The process for transferring to the continuity of operation version from a regular
operational capability of the business is named as?
Question 43 of 50
1 point(s)
Getting all the team members in a cabin around the table for discussing simulated
emergency conditions is known as?
Question 44 of 50
1 point(s)
Which one of the following is the most important issue in the process of forensics from the
initial step?
Question 45 of 50
1 point(s)
Whose function is identical to the cyclic redundancy check, familiar parity
bits, or checksum?
Question 46 of 50
1 point(s)
Which of the following is not “personally identifiable information (PII)”?
Question 47 of 50
1 point(s)
Whose responsibility is to determine what data is required by the company?
Question 48 of 50
1 point(s)
From the following methods which one is perfect for destroying DVD’s data at the desktop?
Question 49 of 50
1 point(s)
Which of the following Information discloses the customer’s identity?
Question 50 of 50
1 point(s)
Which of the following form of cryptography makes key management less of a concern?