CERTIFIED-IN-CYBERSECURITY Practice Questions
788 real CERTIFIED-IN-CYBERSECURITY exam questions with expert-verified answers and explanations. Page 15 of 16.
- Question #701Access Controls Concepts
Which of the following is a best practice for securing remote access to organizational resources?
Remote Access SecurityAccess ControlNetwork SecuritySecurity Best Practices - Question #702Security Principles
Which of the following is an example of personally identifiable information (PII)?
PIIData privacySensitive dataInformation classification - Question #703Access Controls Concepts
What is the primary purpose of a network access control (NAC) system?
Network Access ControlNACAccess ControlNetwork Security - Question #704Security Principles
Which cryptographic mechanism is commonly used to achieve non-repudiation?
CryptographyNon-repudiationDigital signaturesSecurity services - Question #705Data Privacy Fundamentals
What does the principle of data accuracy emphasize in privacy protection?
Data AccuracyPrivacy PrinciplesData ProtectionPersonal Information - Question #706Access Controls Concepts
Which of the following is a best practice for securing cloud-based services?
Cloud securityAccess controlSecurity best practicesPolicy review - Question #707Security Operations
Which of the following is a best practice for securing physical access to organizational resources?
Physical SecurityAccess ControlSecurity Best Practices - Question #708Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Why is business continuity planning important for organizations?
Business Continuity PlanningOrganizational ResilienceRisk MitigationFinancial Impact - Question #709Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
Which of the following is an essential element of a business continuity plan related to human resources?
Business Continuity PlanningHuman ResourcesTraining and AwarenessOrganizational Resilience - Question #710Network Security Concepts
What is the primary purpose of a demilitarized zone (DMZ)?
DMZNetwork SecurityPerimeter SecurityNetwork Architecture - Question #711Security Principles
Which of the following is a best practice for securing Internet of Things (IoT) devices?
IoT SecurityFirmware UpdatesSecurity Best PracticesVulnerability Management - Question #712Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Which of the following terms refers to a predetermined plan of action that defines how an organization will maintain or recover its critical functions during and after a disruption...
Business Continuity PlanningOrganizational ResilienceDisruption ManagementDisaster Recovery - Question #713Access Controls Concepts
What are the four fundamental principles of access control?
Access ControlAuthenticationAuthorizationSecurity Principles - Question #714Security Principles
What is the primary purpose of privacy impact assessments?
Privacy Impact AssessmentData PrivacyRisk ManagementCompliance - Question #715Security Principles
Which term refers to a formalized statement that defines an organization's stance on a particular security issue?
Security PolicyOrganizational SecuritySecurity GovernancePolicy Framework - Question #716Security Principles
What does the concept of data minimization promote in terms of privacy protection?
Data MinimizationPrivacy PrinciplesData Protection - Question #717Security Operations
Which of the following is a best practice for security incident response?
Incident ResponseSecurity PlanningBest PracticesCybersecurity Operations - Question #718Security Principles
Which principle states that individuals should have the right to access and correct their personal information?
Data Subject RightsPrivacy PrinciplesData Protection - Question #719Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Which of the following strategies focuses on maintaining redundant systems or resources to ensure uninterrupted operation during a disruption?
RedundancyBusiness ContinuityDisaster RecoverySystem Availability - Question #720Access Controls Concepts
Which of the following is an example of administrative access control?
Access ControlAdministrative ControlsSecurity PolicyControl Types - Question #721Network Security
What is the primary purpose of an intrusion detection system (IDS)?
Intrusion Detection System (IDS)Network SecurityThreat DetectionSecurity Monitoring - Question #722Access Controls Concepts
Which of the following is an example of a logical access controls
Access ControlLogical Access ControlRole-Based Access ControlSecurity Controls - Question #723Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Why is it important to regularly test and update a business continuity plan?
Business ContinuityPlan TestingPlan Maintenance - Question #724Access Controls Concepts
Which of the following is an example of a technical access control?
Access ControlTechnical ControlsAuthenticationBiometrics - Question #725Business Continuity, Disaster Recovery & Incident Response Concepts
Which of the following terms refers to the maximum tolerable period of disruption for a specific business function or process?
Business ContinuityDisaster RecoveryRecovery Time Objective (RTO)Resilience Planning - Question #726Security Principles
What is the purpose of accountability in information security?
AccountabilitySecurity PrinciplesAuditingSecurity Operations - Question #727Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
Which of the following terms refers to a document that outlines the specific actions and responsibilities of individuals during a disruption?
Emergency responseIncident managementBusiness continuity planningDisruption handling - Question #728Security Principles
Encryption is a process of converting plaintext data into an unreadable format to prevent unauthorized access or interception of sensitive information.
EncryptionData SecurityConfidentialityCybersecurity Basics - Question #729Security Principles
Which of the following is a best practice for securing mobile applications?
Mobile securitySecurity best practicesPatch managementSoftware updates - Question #730Security Principles
What does non-repudiation provide in the context of cybersecurity?
Non-repudiationSecurity principlesCybersecurity fundamentalsInformation security - Question #731Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
What is the purpose of a business continuity coordinator role?
Business ContinuityRoles and ResponsibilitiesDisaster Recovery - Question #732Network Security Concepts
Which of the following is a common type of network vulnerability?
Network vulnerabilitiesVulnerability typesMisconfigurationWeak authentication - Question #733Access Controls Concepts
What does the term "identification" refer to in the context of access control?
Access ControlIdentificationAuthentication - Question #734Access Controls Concepts
What is access control list (ACL)?
Access Control List (ACL)Access ControlSecurity Fundamentals - Question #735Security Principles
Which principle requires organizations to implement appropriate technical and organizational measures to protect personal information?
Data protection principlesData securityInformation protectionCybersecurity principles - Question #736Security Operations
What is the primary purpose of a honeypot?
HoneypotNetwork SecurityThreat DetectionSecurity Monitoring - Question #737Security Operations
Which of the following is a best practice for securing backups?
Backup SecurityData EncryptionData ProtectionSecurity Best Practices - Question #738Security Principles
What is the primary purpose of an information security governance framework?
Information Security GovernanceStrategic PlanningSecurity FrameworksCybersecurity Management - Question #739Network Security
Which of the following is a common type of network monitoring tool?
Network monitoringNetwork security toolsPacket snifferIntrusion Detection System (IDS) - Question #740Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
What is the primary purpose of a business impact analysis (BIA)?
Business Impact AnalysisRecovery Time ObjectiveBusiness Continuity - Question #741Access Controls Concepts
What is multifactor authentication?
Multifactor Authentication (MFA)Authentication FactorsAccess ControlIdentity Verification - Question #742Access Controls Concepts
Which of the following is an example of logical access control?
Access ControlLogical Access ControlFirewallNetwork Security - Question #743Access Controls Concepts
Which component of IAAA ensures that users are granted access to resources based on their established identity?
Access ControlAuthorizationIAAASecurity Principles - Question #744Security Principles
Which of the following practices helps protect individuals' privacy by separating personal information from directly identifiable information?
Data PrivacyAnonymizationData ProtectionPrivacy Enhancing Technologies - Question #745Network Security Concepts
Which of the following is a common type of network firewall?
Firewall typesNetwork securityPacket filteringStateful inspection - Question #746Access Controls Concepts
What are the three main types of access controls?
Access ControlsPhysical SecurityLogical SecurityAdministrative Controls - Question #747Understanding Security Concepts
Which of the following is a common type of network protocol used for secure communication over the internet?
Network ProtocolsSecure CommunicationSSHSecurity Fundamentals - Question #748Security Principles
Which of the following is a common type of malware?
Malware typesTrojan horseRansomwareRootkit - Question #749Security Operations
Which of the following is a best practice for securing virtual environments?
Virtualization securityPatch managementSecurity updatesSystem hardening - Question #750Security Principles
Which of the following privacy principles requires organizations to inform individuals about how their personal information will be collected and used?
Privacy principlesTransparencyData protectionInformation disclosure