Exam Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the exam before. Hence you can not start it again.
Exam is loading…
You must sign in or sign up to start the exam.
You must first complete the following:
Results
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
What is the primary function of a firewall in network security?
CorrectIncorrect -
Question 2 of 15
2. Question
Which of the following encryption protocols is commonly used to secure data during online transactions?
CorrectIncorrect -
Question 3 of 15
3. Question
Which security measure requires users to provide two forms of identification to access a system?
CorrectIncorrect -
Question 4 of 15
4. Question
What does access control ensure in an IT environment?
CorrectIncorrect -
Question 5 of 15
5. Question
What is the primary purpose of an Intrusion Detection System (IDS)?
CorrectIncorrect -
Question 6 of 15
6. Question
Which of the following is an essential aspect of securing a virtualized environment?
CorrectIncorrect -
Question 7 of 15
7. Question
What is the role of encryption in data protection?
CorrectIncorrect -
Question 8 of 15
8. Question
Which of the following is a key security best practice for an organization?
CorrectIncorrect -
Question 9 of 15
9. Question
Which access control method is based on assigning users to roles with specific permissions?
CorrectIncorrect -
Question 10 of 15
10. Question
What is an example of data protection for sensitive information?
CorrectIncorrect -
Question 11 of 15
11. Question
Firewalls are used to monitor network traffic but do not filter data.
CorrectIncorrect -
Question 12 of 15
12. Question
Multi-factor authentication enhances security by requiring more than one form of identification.
CorrectIncorrect -
Question 13 of 15
13. Question
A firewall can encrypt data being transmitted over the internet.
CorrectIncorrect -
Question 14 of 15
14. Question
Role-based access control assigns permissions based on user roles within an organization.
CorrectIncorrect -
Question 15 of 15
15. Question
Virtual machine isolation is essential to prevent attacks from spreading between virtual machines.
CorrectIncorrect