Have a question?
Message sent Close
time left:
:
:

Cybersecurity (SY0-701) Mock Exam 1

Submit quiz
Once you submit, you will no longer be able to change your answers. Are you sure you want to submit the quiz?
1.

During a routine check, the IT department discovered that several employees had left their computers on and unattended during lunch break. Which operational security control can help mitigate the risk associated with this behavior?


A. Implementing biometric authentication
C. Deploying an automatic screen lock after inactivity
B. Enforcing a strict password policy
D. Implementing a secure coding practice
2.

A company wants to ensure that security incidents are detected and addressed as quickly as possible by on-duty personnel. Which of the following operational security controls would be BEST to implement for this purpose?

C. Creating a company-wide security policy
A. Deploying a Network Intrusion Prevention System (NIPS)
B. Establishing a 24/7 Security Operations Center (SOC)
D. Implementing end-to-end data encryption
3.

An art gallery wants to deploy a security solution to detect movement in an open courtyard that features several sculptures. This space has varying temperature conditions, which might cause false alarms in some motion detection technologies. Which type of sensor would be MOST appropriate to ensure consistent motion detection in such conditions?

A. Thermal imaging sensors
C. Ultrasonic detectors
B. Pressure-sensitive mats
D. Microwave motion detectors
4.

Carlos, an IT consultant, advises a startup company on cybersecurity best practices. The company plans to launch several microsites under various subdomains. They want a solution that is cost-effective but also ensures that the sites are validated by a third-party. What type of certificate should Carlos recommend?

A. A separate self-signed certificate for each microsite
D. An EV certificate issued by an internal CA
C. A third-party wildcard certificate
B. An individual third-party certificate for each subdomain
5.

A client disputes having signed a digital contract. The service provider needs to prove that the signature was indeed from the client and hasn’t been tampered with. Which of the following security concepts is the service provider relying on?

C. Non-repudiation
B. Confidentiality
A. Authentication
D. Access Control
  • 1
  • 2
  • 3
  • 4
  • 5