
CSTP Apprenticeship Standard Quiz
Authored by Storm Rae
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the level of autonomy a cyber security technical professional is expected to have?
A considerable degree of autonomy
No autonomy
Minimal autonomy
Only works under direct supervision
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important for a cyber security technical professional to work in accordance with applicable laws, regulations, standards, and ethics?
To ensure their actions are legal and ethical while managing cyber security risks
To avoid working overtime
To increase the number of job roles available
To reduce the need for technical skills
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What knowledge is required to design, build, configure, optimise, test, and troubleshoot simple and complex networks?
Operating system principles and exploits
Network foundations, protocols, and server virtualisation
System development methodologies
Human dimensions of cyber security
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the management of cyber security risk?
Management of cyber security risk, tools and techniques
Application of SIEM tools and techniques
Legal responsibilities of system owners
Assurance concepts and approaches
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which concept is essential when applying a management system and developing an information security management plan?
Concepts & benefits of security management systems, governance & international standards
Application of SIEM tools
Legal responsibilities of employees
Assurance concepts and approaches
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key aspect of configuring and using security technology components and key management?
Security components: how they are used for security/business benefit. Crypto & key management
Legal, regulatory, compliance environment
Assurance concepts and approaches
How to compose a justified security case
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of developing an assurance strategy?
Assurance concepts & approaches
Management of cyber security risk
Legal responsibilities of employers
Security components for business benefit
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?