Untitled - #10341
You will need to achieve a score of 80% or higher to pass the quiz. If you don’t pass on your first attempt, you can retake the quiz as needed.
Knowledge Check 3 Copy
Quiz Summary
0 of 7 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 7 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 7
1. Question
Which of the following controls can be used to protect data that is traversing the network?
CorrectIncorrect -
Question 2 of 7
2. Question
Access to an internal server can be limited by using which of the following security control?
CorrectIncorrect -
Question 3 of 7
3. Question
Cyber Security Frameworks can help organizations to
CorrectIncorrect -
Question 4 of 7
4. Question
Reviewing access and activities from log files is an example of which of the following security controls?
CorrectIncorrect -
Question 5 of 7
5. Question
Which of the following activities is related to vulnerability management
CorrectIncorrect -
Question 6 of 7
6. Question
Which of the following security controls can be used to limit access to certain servers hosted in a facility?
CorrectIncorrect -
Question 7 of 7
7. Question
Securing the data centre with locks and closed-circuit television (CCTV) is an example of which security control category?
CorrectIncorrect