Time limit: 0
Quiz-summary
0 of 14 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
Information
Introduction to Cybersecurity Module 4 Quiz Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 14 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- Answered
- Review
-
Question 1 of 14
1. Question
1 pointsWhat is the correct definition of risk management?Correct
Incorrect
Hint
Risk management is the formal process of continuously identifying and assessing risk in an effort to reduce the impact of threats and vulnerabilities. -
Question 2 of 14
2. Question
1 pointsWhich of the following tools can be used to provide a list of open ports on network devices?Correct
Incorrect
-
Question 3 of 14
3. Question
1 pointsWhich of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?Correct
Incorrect
-
Question 4 of 14
4. Question
1 points‘Today, there are single security appliances that will solve all the network security needs of an organization.’ Is this statement true or false?Correct
Incorrect
Hint
There is no single security appliance or piece of technology that will solve all the network security needs in an organization. -
Question 5 of 14
5. Question
1 pointsWhat name is given to a device that controls or filters traffic going in or out of the network?Correct
Incorrect
Hint
A firewall is designed to control or filter which communications are allowed in and which are allowed out of a device or network. -
Question 6 of 14
6. Question
1 pointsWhat tool can identify malicious traffic by comparing packet contents to known attack signatures?Correct
Incorrect
-
Question 7 of 14
7. Question
1 pointsWhat protocol is used to collect information about traffic traversing a network?Correct
Incorrect
Hint
NetFlow technology is used to gather information about data flowing through a network, including who and what devices are in the network, and when and how users and devices access the network. -
Question 8 of 14
8. Question
1 pointsBehavior-based analysis involves using baseline information to detect what?Correct
Incorrect
-
Question 9 of 14
9. Question
1 pointsWhat is the last stage of a pen test?Correct
Incorrect
Hint
The pen tester will provide feedback via a report that recommends updates to products, policies and training to improve an organization’s security. -
Question 10 of 14
10. Question
1 points‘With careful planning and consideration, some risks can be completely eliminated.’ Is this statement true or false?Correct
Incorrect
-
Question 11 of 14
11. Question
1 pointsWhat is a security playbook?Correct
Incorrect
-
Question 12 of 14
12. Question
1 pointsWhat is the main aim of a Cyber Security Incident Response Team (CSIRT)?Correct
Incorrect
-
Question 13 of 14
13. Question
1 pointsHow do Cisco ISE and TrustSec work?Correct
Incorrect
-
Question 14 of 14
14. Question
1 pointsThe risk management process consists of four steps. Can you put these in the right order?Correct
Incorrect