Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
Answer 50 questions
Test your existing knowledge.
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
Study more effectively: skip concepts you already know and focus on what you still need to learn.
Free Practice Test Instructions:
Choose your answer to the question and click 'Continue' to see how you did. Then click 'Next Question' to answer the next question. When you have completed the free practice test, click 'View Results' to see your results. Good luck!
Question 1 1. Which government agency originated the concept of information security?
Question 2 2. Which of the following is TRUE about an information security management system (ISMS)?
Question 3 3. Which section of an information security framework ensures that the firm follows all applicable state and federal laws?
Question 4 4. Which discipline of information security deals with accounts, certificates, and permissions?
Question 5 5. Anything that can negatively affect an information system is known as a(n) _____.
Question 6 6. Which element of the CIA triad refers to keeping information out of the hands of people who are not authorized to have it?
Question 7 7. What kind of network policy validation would involve giving computer systems immediate access to the network before those computers implement required updates and configuration changes?
Question 8 8. Which organization developed Kerberos encryption?
Question 9 9. Why is the discretionary access control model the most restrictive?
Question 10 10. How is restricted access indicated in an access control matrix?
Question 11 11. What is an essential part of establishing a VPN?
Question 12 12. Why would a business want to consider using vendor supported recovery strategies in the event of an IT disaster?
Question 13 13. Which layer of the OSI Model is responsible for flow control?
Question 14 14. How do firewall access policies control information?
Question 15 15. Which layer of the OSI Model includes software that end users interact with?
Explore our library of over 79,000 lessons
Browse by subject