FCF - Technical Introduction to Cybersecurity 1.
0 Self-Paced
Started on Sunday, March 24, 2024, 9:02 PM
State Finished
Completed on Sunday, March 24, 2024, 9:12 PM
Time taken 9 mins 54 secs
Points 10/10
Grade 100 out of 100
Feedback Congratulations, you passed!
Question 1
Correct
1 points out of 1
Which product should a security architect use first to prevent zero-day attacks?
Select one:
Network access control (NAC)
Sandbox
Firewall
Web application firewall (WAF)
Question 2
Correct
1 points out of 1
A security engineer would like to create a browsing group policy for application hardening. Which two features should the policy include?
(Choose two.)
Select one or more:
Enable password saving
Disable auto-update
Enable pop-up blocker
Clear cookies on exit
Question 3
Correct
1 points out of 1
A security engineer must manage the devices of a large company. Which measures should they implement as part of application hardening?
Select one:
Access only through virtual private networks (VPNs)
A switch audit
An underlay network
A patch management system
Question 4
Correct
1 points out of 1
Which two recommendations should you make to a chief security officer in order to block phishing attempts and their effects? (Choose two.)
Select one or more:
Install a web application firewall (WAF).
Audit the network.
Provide security awareness training to users.
Implement email content filters.
Question 5
Correct
1 points out of 1
Which two security features are included only in the latest generation WAF? (Choose two.)
Select one or more:
Ports allow list
Data loss prevention (DLP)
Signature detection
IP reputation
Question 6
Correct
1 points out of 1
Which characteristic could a digital signature lend to a document?
Select one or more:
Non-repudiation
Encryption
Storage
Clarity
Question 7
Correct
1 points out of 1
Which two tasks should a security engineer perform to protect private data for an organization? (Choose two.)
Select one or more:
Configure Simple Network Management Protocol (SNMP) on all the switches.
Identify sensitive data and classify them.
Identify authorized roles, users, and policies.
Encrypt all the documents in the organization.
Question 8
Correct
1 points out of 1
Which component should a company implement to secure sensitive data in their internal servers?
Select one:
Virtual private network (VPN)
Real-time blackhole list (RBL)
Web application firewall (WAF)
Data loss prevention (DLP)
Question 9
Correct
1 points out of 1
Which factors should a security engineer verify to ensure an organization’s data comply with data sovereignty laws and policies?
Select one:
The audit performed on data at rest.
The risks involved in data destruction.
The laws of the nation where the data are collected.
The compliance of the organization’s in-use data.
Question 10
Correct
1 points out of 1
A chief security officer would like to prevent ransomware in their organization. Which two techniques should you recommend? (Choose two.)
Select one or more:
Use only third-party applications
Encrypt all sensitive data
Provide security awareness training to users
Apply regular patch maintenances and auto-updates