Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
Answer 50 questions
Test your existing knowledge.
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
Study more effectively: skip concepts you already know and focus on what you still need to learn.
Free Practice Test Instructions:
Choose your answer to the question and click 'Continue' to see how you did. Then click 'Next Question' to answer the next question. When you have completed the free practice test, click 'View Results' to see your results. Good luck!
Question 1 1. As the IT manager in an organization, you have decided that people can only get access to information for which they have a business need, and no more. What best describes this principle?
Question 2 2. This type of malware installs itself on a computer system and steals personal information, or logs keystrokes without your knowledge.
Question 3 3. Even though your organization might be competing with other businesses in the same business (e.g., banking), you still must adhere to the same _____ security focus area.
Question 4 4. What best describes any attempt to disable, destroy, or harm a computer system via the Internet or other networks?
Question 5 5. Consider that a third-party vendor wants to send your company data; and you want to load that data into your system. You cannot let them all the way through the network. Which security zone is most appropriate in this situation?
Question 6 6. Once you have established access controls in your organization, what important step is required?
Question 7 7. What is the purpose of an access control matrix for cybersecurity?
Question 8 8. When looking at data classification, what two components must you consider?
Question 9 9. When it comes to sensitive data, what elements do managers need to understand and be able to respond to?
Question 10 10. In order to effectively deliver security awareness training to specialized roles in the organization, which method is most appropriate?
Question 11 11. A new CEO has joined your organization and considers the spending on IT and IT security to be frivolous. As the leader of the IT division, what is your response?
Question 12 12. As you tailor your cybersecurity training program to technical staff, one of the key components is incident response. What would this entail?
Question 13 13. As part of delivering an information security compliance policy to the organization, you must also create which of the following?
Question 14 14. What is the purpose of an IT audit?
It is important for cybersecurity to establish an information security compliance management program. Complete the missing components from the plan:
- Create an organization-wide plan
- Identify assets and collect data
- Put the plan in place
Explore our library of over 79,000 lessons
Browse by subject