Search Header Logo

CSTP Apprenticeship Standard Quiz

Authored by Storm Rae

Computers

Professional Development

Used 1+ times

CSTP Apprenticeship Standard Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the level of autonomy a cyber security technical professional is expected to have?

A considerable degree of autonomy

No autonomy

Minimal autonomy

Only works under direct supervision

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important for a cyber security technical professional to work in accordance with applicable laws, regulations, standards, and ethics?

To ensure their actions are legal and ethical while managing cyber security risks

To avoid working overtime

To increase the number of job roles available

To reduce the need for technical skills

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What knowledge is required to design, build, configure, optimise, test, and troubleshoot simple and complex networks?

Operating system principles and exploits

Network foundations, protocols, and server virtualisation

System development methodologies

Human dimensions of cyber security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the management of cyber security risk?

Management of cyber security risk, tools and techniques

Application of SIEM tools and techniques

Legal responsibilities of system owners

Assurance concepts and approaches

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept is essential when applying a management system and developing an information security management plan?

Concepts & benefits of security management systems, governance & international standards

Application of SIEM tools

Legal responsibilities of employees

Assurance concepts and approaches

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key aspect of configuring and using security technology components and key management?

Security components: how they are used for security/business benefit. Crypto & key management

Legal, regulatory, compliance environment

Assurance concepts and approaches

How to compose a justified security case

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of developing an assurance strategy?

Assurance concepts & approaches

Management of cyber security risk

Legal responsibilities of employers

Security components for business benefit

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?