CERTIFIED-IN-CYBERSECURITY Practice Questions
788 real CERTIFIED-IN-CYBERSECURITY exam questions with expert-verified answers and explanations. Page 14 of 16.
- Question #651Network Security Concepts
Which of the following is a common type of network protocol analyzer?
Network Protocol AnalyzersPacket CaptureNetwork ToolsTraffic Analysis - Question #652Access Controls Concepts
What is a biometric identifier?
BiometricsAuthenticationAccess ControlSecurity Identifiers - Question #653Network Security
Which of the following is a common type of network topology?
Network TopologiesNetworking FundamentalsStar TopologyMesh Topology - Question #654Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Which of the following is a key component of a disaster recovery plan related to hardware and infrastructure?
Disaster RecoveryBusiness ContinuityInfrastructure RecoveryDocumentation - Question #655Network Security Concepts
Which of the following is a common type of network access control (NAC) system?
Network Access Control (NAC)802.1XNetwork SecurityAuthentication - Question #656Access Controls Concepts
Which term represents the three security goals of identification, authentication, authorization, and accountability?
IAAAIdentificationAuthenticationAuthorizationAccountability - Question #657Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
What is the importance of a business impact analysis (BIA) in disaster recovery planning?
Business Impact AnalysisDisaster Recovery PlanningRecovery Time ObjectiveCritical Functions - Question #658Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
Which of the following terms refers to the process of identifying, analyzing, and evaluating security incidents?
Incident ResponseSecurity OperationsSecurity IncidentsCybersecurity Fundamentals - Question #659Network Security Concepts
What is the primary purpose of a network access control list (ACL)
Network SecurityAccess Control ListACLAccess Control - Question #660Security Principles
What is the purpose of a virtualization technology?
VirtualizationNetwork VirtualizationTesting EnvironmentsDevelopment Environments - Question #661Security Operations
Which of the following is a best practice for securing web applications?
Web Application SecurityPatch ManagementSecurity Best PracticesVulnerability Management - Question #6624. Network Security Concepts
Which of the following is a common type of network encryption protocol?
Network EncryptionTLSSSLWPA2 - Question #663Security Principles
What is the difference between a vulnerability and an exploit?
VulnerabilityExploitCybersecurity BasicsThreats and Risks - Question #664Access Controls Concepts
What is the difference between authentication and authorization?
AuthenticationAuthorizationAccess ControlIdentity Management - Question #665Security Operations
Which of the following is a common type of network scanning tool?
Network scanningCybersecurity toolsVulnerability scanningPort scanning - Question #666Security Operations
What is the process of removing unnecessary programs, services, and protocols from a system called?
system hardeningsecurity configurationminimizationoperational security - Question #667Access Controls Concepts
Which of the following is a best practice for password management?
Password managementSecurity best practicesAccess controlAuthentication - Question #668Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
Which of the following terms refers to the process of recovering IT systems and data at a secondary location after a major disaster that renders the primary site unavailable?
Disaster RecoveryBusiness ContinuityRecovery Sites - Question #669Threats, Vulnerabilities & Security Assessments
What is the difference between a risk assessment and a vulnerability assessment?
Risk AssessmentVulnerability AssessmentSecurity Assessments - Question #670Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
What is the purpose of conducting a tabletop exercise as part of business continuity planning?
Tabletop ExerciseBusiness Continuity PlanningIncident ResponseTesting - Question #671Access Controls Concepts
Which of the following is an example of physical access control?
Physical Access ControlPhysical SecuritySecurity Controls - Question #672Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Which of the following is NOT a component of a business continuity plan?
Business Continuity PlanningDisaster RecoveryRisk ManagementIncident Response - Question #673Network Security Concepts
Which of the following is a common type of network infrastructure device?
Network DevicesFirewallRouterSwitch - Question #674Security Operations
What is the purpose of a security audit?
Security auditSecurity controlsEffectiveness assessment - Question #675Security Principles
Which of the following is a best practice for securing cloud-based services?
Cloud SecurityData EncryptionData ProtectionSecurity Best Practices - Question #676Network Security Concepts
What is a virtual private network (VPN)?
VPNRemote AccessNetwork SecuritySecure Connectivity - Question #677Access Controls Concepts
What is a security token?
Security TokenAuthenticationPhysical DeviceCredentials - Question #678Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
Which of the following components of a business continuity plan focuses on resuming normal operations at an alternate location?
Business Continuity PlanDisaster RecoveryIT System RecoveryAlternate Site Operations - Question #679Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
Why is it important to regularly test a disaster recovery plan?
Disaster RecoveryDR Plan TestingBusiness Continuity - Question #680Access Controls Concepts
What is authentication?
AuthenticationIdentity VerificationAccess Control - Question #681Network Security Concepts
Which of the following is a best practice for securing network devices?
Network SecurityFirmware ManagementSecurity Best PracticesDevice Hardening - Question #682Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
What is the key purpose of a disaster recovery plan (DRP)?
Disaster Recovery PlanBusiness ContinuityRecovery ProceduresIncident Response - Question #683Business Continuity, Disaster Recovery & Incident Response Concepts
What is the purpose of a crisis communication plan in business continuity planning?
Crisis CommunicationBusiness Continuity PlanningIncident ResponseCommunication Channels - Question #684Security Principles
What is the purpose of access controls in cybersecurity?
Access ControlAuthorizationSecurity PrinciplesInformation Security - Question #685Access Controls Concepts
What is a smart card?
Smart CardAuthenticationCredentialsAccess Control - Question #686Network Security
Which of the following is a common type of network attack?
Network attacksDenial of ServiceMalwareSocial engineering - Question #687Network Security Concepts
Which of the following is a common type of denial-of-service (DoS) attack?
DoS attacksNetwork attacksCyber attack typesPing flood - Question #688Access Controls Concepts
What is authorization?
AuthorizationAccess ControlSecurity ConceptsIdentity and Access Management - Question #689Security Principles
Which privacy principle gives individuals the right to withdraw their consent to the processing of their personal information?
Data privacyPrivacy principlesConsent managementData subject rights - Question #690Security Principles
To prevent unauthorized access. The primary objective of network security is to protect the confidentiality, integrity, and availability of network resources by preventing unauthor...
Cybersecurity FundamentalsNetwork SecurityCIA TriadUnauthorized Access - Question #691Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Which of the following is a key objective of business continuity planning?
Business Continuity PlanningDisaster RecoveryRisk ManagementOrganizational Resilience - Question #692Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
Which of the following terms describes the process of restoring data and systems to a previous state after a disruption?
Disaster RecoveryBusiness ContinuityData RestorationSystem Recovery - Question #693Access Controls Concepts
Which of the following is an example of a physical access control?
Physical SecurityAccess ControlSecurity Controls - Question #694Data Privacy Concepts
What does the principle of purpose limitation emphasize in privacy protection?
Privacy PrinciplesPurpose LimitationData Minimization - Question #695Security Principles
Which of the following is a common type of social engineering attack?
social engineeringphishingcybersecurity threatsattack types - Question #696Security Principles
What is the purpose of security procedures?
Security ProceduresSecurity ControlsImplementation Guidance - Question #697Business Continuity, Disaster Recovery & Incident Response Concepts
Which of the following components is typically included in a disaster recovery plan?
Disaster RecoveryData BackupRecovery ProceduresBusiness Continuity - Question #698Security Principles
What is the purpose of a privacy policy?
Privacy PolicyData PrivacySecurity GovernanceCompliance - Question #699Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Which of the following is NOT a component of a business continuity plan?
Business Continuity PlanDisaster RecoveryRisk ManagementIncident Response - Question #700Security Principles
What is an access control model?
Access ControlAccess Control ModelsSecurity Concepts