Time limit: 0
Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
Α company is planning to increase the security of its private network by adding a new security device between the public and its private network. The device will be used as a proxy server and will be responsible for routing the traffic between the two networks. Which of the following devices should be installed to isolate access to the internal network?
CorrectIncorrect -
Question 2 of 15
2. Question
As a cybersecurity analyst, you need to find a way to fool attackers into attacking networks that look like legitimate targets with the aim of tracking their behavior and collecting clues that will help you make the real network more secure. Which of the following approaches describes this scenario?
CorrectIncorrect -
Question 3 of 15
3. Question
A web developer wants to protect its web application from session hijacking attacks. Which of the following actions should a web developer perform to prevent an attacker from exploiting valid sessions? (Choose all that apply.)
CorrectIncorrect -
Question 4 of 15
4. Question
Mike’s organization uses a hybrid approach for its infrastructure as they have an on-premise environment for their services but also they use Amazon Web Services for other services. Which of the following software tools do they need to ensure that network traffic between on-premises devices and the cloud provider complies with the organization’s security policies?
CorrectIncorrect -
Question 5 of 15
5. Question
You are implementing an active defense strategy for your organization. Which of the following actions should you perform to outmaneuver an adversary and make an attack more difficult to carry out.
CorrectIncorrect -
Question 6 of 15
6. Question
The developer team of your company has just released a new social media app. The next task for the team is to measure the robustness of the new app under extremely heavy load conditions to ensure that the app doesn’t crash under crunch situations. Which of the following software assessment actions do they need to follow to complete the task?
CorrectIncorrect -
Question 7 of 15
7. Question
A cybersecurity researcher is debugging a code by examining the source code of the application before the execution. Which of the following code analysis methods does the researcher is currently performing?
CorrectIncorrect -
Question 8 of 15
8. Question
A cybersecurity researcher is debugging a code by examining how the application behaves during and after the execution. Which of the following code analysis methods the researcher is currently performing?
CorrectIncorrect -
Question 9 of 15
9. Question
The developer of your company just released a new version of the registration form on the web application. Now the username field should contain only characters and the password field accepts special characters and numbers. This is an example of which secure coding best practices?
CorrectIncorrect -
Question 10 of 15
10. Question
The process of replacing HTML control characters (e.g. , “, &, etc) into their encoded representatives (e.g. “& lt ;” “& gt ;” “& quot ;” “& amp ;” etc..) is known as?
CorrectIncorrect -
Question 11 of 15
11. Question
Which of the following are the tactics of the Enterprise ATT&CK framework? (Choose all that apply.)
CorrectIncorrect -
Question 12 of 15
12. Question
Students at examsdigest.com log in using their username and password. As this method has security issues, ExamsDigest’s team is looking for solutions to increase the security of the login system by requiring students to provide more evidence to prove their identity. Which of the following authentication methods does ExamsDigest need to implement?
CorrectIncorrect -
Question 13 of 15
13. Question
A Self-Encrypting Drive is a type of hard drive that automatically and continuously encrypts the data on the drive without any user interaction. (TRUE/FALSE)
CorrectIncorrect -
Question 14 of 15
14. Question
Which of the following hardware root of trust terms is a chip that stores RSA encryption keys specific to the host system for hardware authentication?
CorrectIncorrect -
Question 15 of 15
15. Question
A developer is building a new CRUD application for a university. The path like
university.com/students/2/course/6
accessing the course with id 6 for the student with id 2. This is an example of which service-oriented architecture?CorrectIncorrect