Time limit: 0
Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
Which of the following methods should you use to deal with the huge volume of new threats seen daily?
CorrectIncorrect -
Question 2 of 15
2. Question
Which of the following sources of information would provide you with the most accurate information for you to use in determining which network service has been stopped working on the company’s network?
CorrectIncorrect -
Question 3 of 15
3. Question
You are conducting a log review scan to detect the users who have been locked out from their accounts in order to proceed to the recovery stage. Which of the following sources of information would provide you with the most accurate information for you to use in determining who has been locked out or not?
CorrectIncorrect -
Question 4 of 15
4. Question
A developer is building a new corporate application that needs to be accessed only by selective employees based on their IP addresses. Which of the following access control methods should the developer implement?
CorrectIncorrect -
Question 5 of 15
5. Question
A new social media app was launched recently that accepts all users worldwide by default. A cybersecurity analyst after reviewing the firewall logs detects that users from specific countries have conducted a cyber attack on the app. Which of the following access control methods should the analyst recommend to the developers?
CorrectIncorrect -
Question 6 of 15
6. Question
You have been tasked to improve the wired network security of the company’s network by limiting the number of MAC addresses on a given port. Packets that have a matching MAC address should be considered secure packets and should be forwarded; all other packets (unsecured packets) should be restricted. Which of the following features should you implement to complete the task?
CorrectIncorrect -
Question 7 of 15
7. Question
Which of the following process is designed to trigger automatic code integration in the main code base instead of developing in isolation and then integrating them at the end of the development cycle?
CorrectIncorrect -
Question 8 of 15
8. Question
The developers of your company, for efficiency, need to implement a solution to deploy new code releases automatically into the production environment. Which of the following software development methods should the developers implement?
CorrectIncorrect -
Question 9 of 15
9. Question
Which of the following options is a dictionary that provides definitions for publicly disclosed cybersecurity vulnerabilities and exposures?
CorrectIncorrect -
Question 10 of 15
10. Question
You have set up an Intrusion detection system (IDS) and suddenly the IDS identifies an activity as an attack but the activity is acceptable behavior. The state, in this case, is known as:
CorrectIncorrect -
Question 11 of 15
11. Question
Which of the following actions should you perform to reduce the attack surface area of a given network or system? (Choose all that apply.)
CorrectIncorrect -
Question 12 of 15
12. Question
You have been tasked to implement a solution to allow users from untrusted networks to access the Web Server and the Mail Server while keeping the private network secured and inaccessible. Which of the following do you need to implement to complete the task?
CorrectIncorrect -
Question 13 of 15
13. Question
Which of the following protocols is commonly used to collect information about CPU utilization and bandwidth from network devices and automatically send the administrator an email if a predefined threshold is exceeded?
CorrectIncorrect -
Question 14 of 15
14. Question
What problems can be caused by malicious payloads? (Choose all that apply.)
CorrectIncorrect -
Question 15 of 15
15. Question
During a vulnerability scan, you found a serious SQL injection vulnerability in one of your online shops that has 10,000 daily visitors. The eshop provides 99.999% availability to customers so it can’t be taken offline to fix the SQL injection vulnerability. Which of the following solutions should you recommend to the eshop administrators until the eshop can be remediated?
CorrectIncorrect