You will need to achieve a score of 80% or higher to pass the quiz. If you don’t pass on your first attempt, you can retake the quiz as needed.
Knowledge Check 3 Copy
0 of 7 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 7 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Which of the following controls can be used to protect data that is traversing the network?CorrectIncorrect
Access to an internal server can be limited by using which of the following security control?CorrectIncorrect
Cyber Security Frameworks can help organizations toCorrectIncorrect
Reviewing access and activities from log files is an example of which of the following security controls?CorrectIncorrect
Which of the following activities is related to vulnerability managementCorrectIncorrect
Which of the following security controls can be used to limit access to certain servers hosted in a facility?CorrectIncorrect
Securing the data centre with locks and closed-circuit television (CCTV) is an example of which security control category?CorrectIncorrect