Cyber Security Quizzes & Trivia


CDC 3D053 Cyber Surety Journeyman Volume 3. Communications Security (COMSEC)

Questions: 52  |  Attempts: 281   |  Last updated: Feb 19, 2013
  • Sample Question
    (401) Which communications security (COMSEC) tier generates, distributes, and performs accounting functions of all modern key, physical traditional key, and certain electronic key?

Cyber security is very important especially in this day and age where everything is automated. No programmer or tech wiz would appreciate if their security protocols are hacked therefore the need to be educated on how to...

Questions: 50  |  Attempts: 261   |  Last updated: Jun 25, 2018
  • Sample Question
    Which of the following is seen as non-secure based on its ability to only store seven uppercase characters of data making it susceptible to brute force attacks?       

3D053 Cyber Surety Journeyman Volume 1. Information Protection – Internal Control URE's

Questions: 80  |  Attempts: 252   |  Last updated: Aug 17, 2017
  • Sample Question
    (001) The Cyber Surety journeyman monitors all of the following programs except

Security.

Questions: 116  |  Attempts: 153   |  Last updated: May 25, 2017
  • Sample Question
    Which of the following elements of PKI are found in a browser's trusted root CA?

Cyber security is a form of protection for computers that you most know of. In light of that, why not try out these quizzes and see what you can do?

Questions: 10  |  Attempts: 100   |  Last updated: Mar 5, 2018
  • Sample Question
    What's the definition of a backdoor?




Cyber Security Questions & Answers


What is the correct order of the penetration testing phase?
Why is C? I think correct isA -Planning,discovery, attack, reporting Explanations please.
What should a business impact analysis (BIA) identify?
B. The estimated probability of the identified threats actually occurring. C. The efficiency and effectiveness of existing risk mitigation controls. D. A list of potential vulnerabilities, dangers and/or threats.
What should a business impact analysis (BIA) identify?
The efficiency and effectiveness of existing risk mitigation controls. A list of potential vulnerabilities, dangers and/or threats. Which types of data backups (full, incremental and differential) will be used.
What is the correct order of the incident response process?
Not really. All methodologies claims: 1. PREPARATION 2. DETECTION AND REPORTING 3. TRIAGE AND ANALYSIS 4. CONTAINMENT AND NEUTRALIZATION 5. POST-INCIDENT ACTIVITY
More