CyberSecurity Fundamentals Prep Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Texag95
T
Texag95
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,957
Questions: 10 | Attempts: 3,957

SettingsSettingsSettings
Cybersecurity Fundamentals Prep Quiz - Quiz

Are you ready for this Cybersecurity Fundamentals Prep Quiz? This is a quiz for the Cybersecurity Fundamentals Certificate. It's based on sample questions and the end-of-topic questions in the workbook. This quiz will give you more clarity of your understanding of it, as well as you will go with extra knowledge. So, prepare yourself, and take this amazing quiz. Learn some new facts as you take it. Good luck to you with this test!


Questions and Answers
  • 1. 

    Risk assessments should be performed

    • A.

      At the start of a program

    • B.

      On a regular basis

    • C.

      When an asset changes

    • D.

      When a vulnerability is discovered

    Correct Answer
    B. On a regular basis
    Explanation
    Risk assessments should be performed on a regular basis to ensure that any potential risks or vulnerabilities are identified and addressed in a timely manner. By conducting regular risk assessments, organizations can stay proactive in managing risks and making informed decisions to mitigate them. This allows for a continuous evaluation of the effectiveness of existing controls and the identification of new risks that may arise over time. Regular risk assessments also help in maintaining compliance with regulatory requirements and industry best practices. Overall, conducting risk assessments on a regular basis is essential for maintaining a proactive and effective risk management approach.

    Rate this question:

  • 2. 

    The principle of ________ or ________ should be implemented by System hardening.

    • A.

      Governance, compliance

    • B.

      Least privilege, access control

    • C.

      Stateful inspection, remote access

    • D.

      Vulnerability assessment, risk mitigation

    Correct Answer
    B. Least privilege, access control
    Explanation
    System hardening refers to the process of securing a computer system by reducing its vulnerabilities and minimizing potential attack surfaces. The principle of least privilege ensures that users and processes are only granted the minimum level of access necessary to perform their tasks, reducing the risk of unauthorized access or malicious activities. Access control, on the other hand, involves the implementation of mechanisms to regulate and manage user access to resources within a system. By combining the principles of least privilege and access control, system hardening can effectively enhance security and protect against potential threats.

    Rate this question:

  • 3. 

    Three common controls used to protect the availability of information are: 

    • A.

      Redundancy, backups, and access controls.

    • B.

      Encryption, file permissions, and access controls.

    • C.

      Access controls, logging, and digital signatures.

    • D.

      Hashes, logging, and backups.

    Correct Answer
    A. Redundancy, backups, and access controls.
    Explanation
    Redundancy ensures that there are multiple copies of the information or systems in place, so that if one fails, there are backups available to maintain availability. Backups involve regularly creating copies of data or systems in case of loss or damage, allowing for the restoration of information and maintaining availability. Access controls restrict and manage user access to information, ensuring that only authorized individuals can access it, thereby protecting its availability. Therefore, the combination of redundancy, backups, and access controls is effective in safeguarding the availability of information.

    Rate this question:

  • 4. 

    Which all of these are considered as the key functions important for the protection of digital assets according to the NIST framework? Select 3 of these.

    • A.

      Encrypt

    • B.

      Protect

    • C.

      Investigate

    • D.

      Recover

    • E.

      Identify

    Correct Answer(s)
    B. Protect
    D. Recover
    E. Identify
    Explanation
    The NIST (National Institute of Standards and Technology) framework for improving critical infrastructure cybersecurity identifies several key functions that are crucial for the protection of digital assets. Among the options given:
    Protect: This function involves implementing the appropriate safeguards to ensure delivery of critical infrastructure services.
    Recover: This function focuses on developing and implementing the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.
    Identify: This function assists in developing an organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.
    These three—Protect, Recover, and Identify—are considered key functions in the NIST framework for effectively managing and protecting digital assets. "Encrypt" is a subset of the Protect function but not a separate key function in the NIST framework, and "Investigate" typically falls under the Respond function, specifically post-incident activities.

    Rate this question:

  • 5. 

    One map Ethernet to which layer of the Open Systems Interconnect (OSI) Model?

    • A.

      Data Link

    • B.

      Network

    • C.

      Application

    • D.

      Transport

    Correct Answer
    A. Data Link
    Explanation
    Ethernet is a protocol that operates at the Data Link layer of the OSI Model. This layer is responsible for the reliable transfer of data between directly connected network devices. Ethernet provides a set of rules for how data should be formatted, addressed, transmitted, and received over a network. It defines the physical and logical connections between devices and handles error detection and correction. Therefore, Ethernet is closely associated with the Data Link layer of the OSI Model.

    Rate this question:

  • 6. 

    As defined by ISO, which of these are considered as the functional areas of network management? Select all that apply.

    • A.

      Accounting management

    • B.

      Fault management

    • C.

      Firewall management

    • D.

      Performance management

    • E.

      Security management

    Correct Answer(s)
    A. Accounting management
    B. Fault management
    D. Performance management
    E. Security management
    Explanation
    The functional areas of network management, as defined by ISO, include accounting management, fault management, performance management, and security management. These areas are crucial for effectively managing and maintaining a network. Accounting management involves tracking network usage and costs. Fault management focuses on identifying and resolving network issues. Performance management involves monitoring and optimizing network performance. Security management deals with protecting the network from unauthorized access and ensuring data confidentiality. Firewall management, although important for network security, is not specifically mentioned as a functional area of network management according to ISO.

    Rate this question:

  • 7. 

    The cybersecurity role that is charged with the responsibility of managing incidents and remediation is

    • A.

      Board of directors

    • B.

      Executive committee

    • C.

      Cybersecurity management

    • D.

      Cybersecurity practitioners

    Correct Answer
    C. Cybersecurity management
    Explanation
    Section 1

    Rate this question:

  • 8. 

    The element of an incident response plan that involves obtaining and preserving evidence is

    • A.

      Preparation

    • B.

      Identification

    • C.

      Containment

    • D.

      Eradication

    Correct Answer
    C. Containment
    Explanation
    Containment is the element of an incident response plan that involves obtaining and preserving evidence. During this phase, the focus is on isolating the affected systems or network segments to prevent further damage and to preserve the evidence for forensic analysis. Containment measures may include disconnecting affected devices from the network, disabling compromised accounts, or implementing firewalls and access controls. By containing the incident, organizations can minimize the impact and gather crucial evidence to understand the nature of the attack and take appropriate actions for eradication and recovery.

    Rate this question:

  • 9. 

    NIST defines a(n) BLANK as a “violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices.” 

    • A.

      Disaster

    • B.

      Event

    • C.

      Threat

    • D.

      Incident

    Correct Answer
    D. Incident
    Explanation
    NIST defines an incident as a "violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices." This means that an incident refers to any breach or potential breach of security protocols or policies in place. It could involve unauthorized access, data breaches, or any other form of security violation.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 19, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 18, 2016
    Quiz Created by
    Texag95
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.