CERTIFIED-IN-CYBERSECURITY Practice Questions
788 real CERTIFIED-IN-CYBERSECURITY exam questions with expert-verified answers and explanations. Page 13 of 16.
- Question #601Security Principles
Which of the following is an example of a physical security control?
Physical SecuritySecurity ControlsAccess Control - Question #602Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
What is the role of a recovery team in the context of disaster recovery?
Disaster RecoveryRecovery TeamBusiness ContinuityIncident Response - Question #603Security Principles
What is the difference between a virus and a worm?
MalwareVirusWormThreats - Question #604Security Operations
What is the purpose of a security information and event management (SIEM) system?
SIEMSecurity MonitoringEvent ManagementSecurity Tools - Question #605Security Principles
Which concept relates to an individual's ability to control the disclosure of their personal information?
PrivacyData ProtectionPersonal Information - Question #606Access Controls Concepts
Which of the following is a best practice for password management?
Password ManagementSecurity Best PracticesAuthenticationAccess Control - Question #607Network Security Concepts
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
FirewallNetwork SecuritySecurity DevicesTraffic Filtering - Question #608Access Controls Concepts
What does the term "least privilege" refer to in the context of access control?
Least PrivilegeAccess ControlSecurity Principles - Question #609Access Controls Concepts
Which of the following is a best practice for network security?
Network SecurityLeast PrivilegeAccess ControlBest Practices - Question #610Network Security Concepts
Which of the following is a common type of network switch?
Network SwitchesOSI ModelNetwork DevicesNetworking Fundamentals - Question #611Network Security
Which of the following is a common type of network routing protocol?
Network ProtocolsRouting ProtocolsBGPOSPF - Question #612Security Principles
Which concept refers to the process of removing personally identifiable information from data, making it no longer associated with an individual?
Data privacyPIIAnonymizationData protection - Question #613Security Operations
What is the purpose of a vulnerability scan?
Vulnerability scanningSecurity assessmentsCybersecurity fundamentals - Question #614Network Security Concepts
What is the primary purpose of a network intrusion detection system (IDS)?
IDSNetwork SecurityThreat DetectionSecurity Tools - Question #615Security Principles
What is the purpose of a security policy?
Security PoliciesInformation Security GovernanceRisk Management - Question #616Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
What is the primary purpose of a backup rotation strategy in disaster recovery planning?
Backup RotationDisaster RecoveryData ManagementBackup Strategy - Question #617Network Security Concepts
What is the primary purpose of a network demilitarized zone (DMZ)?
DMZNetwork SecurityPerimeter SecurityNetwork Architecture - Question #618Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Why is documentation of recovery procedures important in disaster recovery planning?
Disaster RecoveryRecovery ProceduresDocumentationBusiness Continuity - Question #619Business Continuity, Disaster Recovery, and Incident Response
Which of the following is an essential component of a disaster recovery plan related to communication?
Disaster Recovery PlanningCrisis CommunicationBusiness ContinuityIncident Response - Question #620Network Security Concepts
What is the purpose of a firewall?
FirewallNetwork SecurityAccess Control - Question #621Security Principles
Which of the following is an example of a preventive control?
Security ControlsPreventive ControlsIntrusion Detection SystemCybersecurity Fundamentals - Question #622Security Operations
Which of the following is a best practice for system hardening?
System HardeningSecurity Best PracticesAttack Surface ReductionLeast Functionality - Question #623Security Principles
Which of the following is a best practice for data retention?
Data RetentionData MinimizationInformation GovernanceCompliance - Question #624Network Security Concepts
What is a demilitarized zone (DMZ)?
DMZNetwork SecurityNetwork ArchitectureFirewalls - Question #625Network Security
What is the purpose of intrusion detection and prevention systems (IDPS)?
IDPSNetwork SecurityIntrusion DetectionSecurity Controls - Question #626Network Security Concepts
Which of the following is a common type of network load balancer?
Network Load BalancingLoad Balancer AlgorithmsNetwork ServicesInfrastructure Components - Question #627Network Security Concepts
What is the difference between a firewall and an intrusion detection system (IDS)?
FirewallIDSNetwork SecuritySecurity Controls - Question #628Network Security Concepts
Which of the following is a common type of network proxy server?
Proxy serverNetwork securityNetworking fundamentalsNetwork architecture - Question #629Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
Which of the following is an essential component of an incident response plan related to communication?
Incident ResponseCommunication PlanCrisis ManagementSecurity Operations - Question #630Security Principles
Which principle of the CIA Triad ensures that information is only accessible to authorized individuals or entities?
CIA TriadConfidentialityInformation Security Principles - Question #631Security Operations
Which of the following is a best practice for securing mobile devices?
Mobile securityDevice securityEncryptionData protection - Question #632Security Principles
Which principle of the CIA Triad ensures that information is accurate, complete, and trustworthy?
CIA TriadIntegrityInformation Security PrinciplesData Accuracy - Question #633Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Why is off-site data backup an important consideration in disaster recovery?
Disaster RecoveryData BackupOff-site StorageBusiness Continuity - Question #634Network Security Concepts
Which of the following is a best practice for securing wireless networks?
Wireless SecurityNetwork SecurityEncryptionBest Practices - Question #635Security Operations
What is the purpose of a honeypot?
HoneypotsSecurity ToolsThreat IntelligenceDeception Technology - Question #636Access Controls Concepts
What is the principle of least privilege?
Least PrivilegeAccess ControlSecurity Principles - Question #637Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
What is the purpose of an incident response plan (IRP)?
Incident Response PlanIRPIncident ManagementSecurity Incidents - Question #638Security Operations
Which of the following is a common type of network vulnerability scanner?
Vulnerability ScanningNetwork Security ToolsSecurity Operations - Question #639Security Principles
What is the purpose of a risk assessment?
Risk AssessmentRisk ManagementCybersecurity PrinciplesImpact Analysis - Question #640Security Principles
What does the term "non-repudiation" refer to in the context of cybersecurity?
Non-repudiationSecurity principlesInformation securityCybersecurity concepts - Question #641Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
What is the importance of conducting regular risk assessments in the context of disaster recovery?
Risk AssessmentDisaster RecoveryVulnerability ManagementIT Security - Question #642Security Principles
Which of the following is an example of a technical control?
Technical controlsSecurity controlsFirewallCybersecurity fundamentals - Question #643Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
What is the purpose of a recovery point objective (RPO) in disaster recovery planning?
Recovery Point ObjectiveRPODisaster RecoveryData Loss - Question #644Access Controls Concepts
What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?
Access ControlMACDACSecurity Models - Question #645Security Principles
Which of the following is an example of an AUP violation?
Acceptable Use Policy (AUP)Security PolicyPolicy ViolationUser Responsibility - Question #646Security Principles
Which of the following is an effective way to prevent unauthorized access to data?
Data ProtectionAccess ControlNetwork SecurityPreventative Measures - Question #647Security Principles
Which of the following is an example of social engineering?
Social EngineeringPhishingCybersecurity AttacksThreats - Question #648Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Which of the following is a best practice for data backup and recovery?
Data BackupData RecoveryBest PracticesCybersecurity - Question #649Network Security Concepts
What is the primary purpose of a virtual private network (VPN)?
VPNNetwork SecurityRemote AccessEncryption - Question #650Security Principles
What is the purpose of an acceptable use policy (AUP)?
Acceptable Use PolicySecurity PoliciesOrganizational GuidelinesSecurity Governance