0% found this document useful (0 votes)
337 views4 pages

Quiz - Secure Data and Applications - Attempt Review

The document discusses a technical introduction to cybersecurity self-paced course completed by the user, which consisted of 10 multiple choice questions covering topics like zero-day attacks, application hardening, phishing prevention, web application firewalls, digital signatures, data protection, and ransomware prevention.

Uploaded by

studiokapulana
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
337 views4 pages

Quiz - Secure Data and Applications - Attempt Review

The document discusses a technical introduction to cybersecurity self-paced course completed by the user, which consisted of 10 multiple choice questions covering topics like zero-day attacks, application hardening, phishing prevention, web application firewalls, digital signatures, data protection, and ransomware prevention.

Uploaded by

studiokapulana
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 4

 FCF - Technical Introduction to Cybersecurity 1.

0 Self-Paced
Started on Sunday, March 24, 2024, 9:02 PM
State Finished
Completed on Sunday, March 24, 2024, 9:12 PM
Time taken 9 mins 54 secs
Points 10/10
Grade 100 out of 100
Feedback Congratulations, you passed!

Question 1

Correct

1 points out of 1

Which product should a security architect use first to prevent zero-day attacks?

Select one:
Network access control (NAC)
Sandbox
Firewall
Web application firewall (WAF)

Question 2
Correct

1 points out of 1

A security engineer would like to create a browsing group policy for application hardening. Which two features should the policy include?
(Choose two.)

Select one or more:


Enable password saving
Disable auto-update
Enable pop-up blocker
Clear cookies on exit
Question 3

Correct

1 points out of 1

A security engineer must manage the devices of a large company. Which measures should they implement as part of application hardening?

Select one:
Access only through virtual private networks (VPNs)
A switch audit
An underlay network
A patch management system

Question 4

Correct

1 points out of 1

Which two recommendations should you make to a chief security officer in order to block phishing attempts and their effects? (Choose two.)

Select one or more:


Install a web application firewall (WAF).
Audit the network.
Provide security awareness training to users.
Implement email content filters.

Question 5

Correct

1 points out of 1

Which two security features are included only in the latest generation WAF? (Choose two.)

Select one or more:


Ports allow list
Data loss prevention (DLP)
Signature detection
IP reputation
Question 6
Correct

1 points out of 1

Which characteristic could a digital signature lend to a document?

Select one or more:


Non-repudiation
Encryption
Storage
Clarity

Question 7

Correct

1 points out of 1

Which two tasks should a security engineer perform to protect private data for an organization? (Choose two.)

Select one or more:


Configure Simple Network Management Protocol (SNMP) on all the switches.
Identify sensitive data and classify them.
Identify authorized roles, users, and policies.
Encrypt all the documents in the organization.

Question 8
Correct

1 points out of 1

Which component should a company implement to secure sensitive data in their internal servers?

Select one:
Virtual private network (VPN)
Real-time blackhole list (RBL)
Web application firewall (WAF)
Data loss prevention (DLP)
Question 9
Correct

1 points out of 1

Which factors should a security engineer verify to ensure an organization’s data comply with data sovereignty laws and policies?

Select one:
The audit performed on data at rest.
The risks involved in data destruction.
The laws of the nation where the data are collected.
The compliance of the organization’s in-use data.

Question 10
Correct

1 points out of 1

A chief security officer would like to prevent ransomware in their organization. Which two techniques should you recommend? (Choose two.)

Select one or more:


Use only third-party applications
Encrypt all sensitive data
Provide security awareness training to users
Apply regular patch maintenances and auto-updates

You might also like