Test your cyber security knowledge with our cyber security quiz 0% 0 votes, 0 avg 40 Cyber Security Quiz 1 / 11 What technology/system can you easily deploy in your network to identify a breach without any false positives? Next generation endpoint protection Next generation firewall Deception Platform Security information and event management All of the above 2 / 11 What is the most cost effective way of delivering a distributed LAN that is secure and has a high fault tolerance? MPLS Dark fibre SD WAN 3 / 11 Which of the following will not protect data at rest on your computer? A VPN Anti Virus Full Disk Encryption All of the above None of the above 4 / 11 What statements regarding encryption and hashing are true? Encryption can turn human readable data into an unreadable format Hashing can turn human readable data into an unreadable format Both can turn human readable data into an unreadable format, but only encrypted data can be reliably returned 5 / 11 A website displaying a padlock with a valid certificate from a known certificate authority means that it is secure? True False 6 / 11 What is the best method of protecting a website against cyber attacks? Place the website behind a web application firewall Ensure regular code reviews take place Conduct regular and ongoing penetration testing Ensure that there is next generation AV protecting the operating system All of the above 7 / 11 Which of the following cyber attacks self-replicate? Virus Worm Phishing Attack Spam 8 / 11 Your I.T. department has enabled the use of TLS encryption on the email server, does this mean that all of your emails are guaranteed to be encrypted between third parties? Yes No 9 / 11 In cyber security, the principle of least privilege means? Administrators should change their passwords regularly to prevent hackers from getting them User accounts should be restricted to access and change data and systems which are essential to their role All software should be tested regularly to prevent bugs from interfering with performance Users should not be allowed to use their own devices on the corporate network 10 / 11 What is a zero-day attack? Software vendor releasing a software patch for a recently discovered vulnerability Testing whether the system is vulnerable to attack Developer or public becoming aware of the exploited vulnerability Attack that exploits a previously unknown vulnerability 11 / 11 If you are ISO27001 or PCI DSS compliant, does it mean that you are secure? Yes No Your score is The average score is 52% LinkedIn Facebook Twitter 0% Restart quiz