CSTP Apprenticeship Standard Quiz

CSTP Apprenticeship Standard Quiz

Professional Development

30 Qs

quiz-placeholder

Similar activities

Fortress IQ: The ISMS Quest

Fortress IQ: The ISMS Quest

Professional Development

25 Qs

Security+_Domain_5

Security+_Domain_5

Professional Development

33 Qs

Part 1.3

Part 1.3

Professional Development

25 Qs

Cyber Crime Investigation

Cyber Crime Investigation

Professional Development

28 Qs

Computer Application "Filler" Assessment (T1a1)

Computer Application "Filler" Assessment (T1a1)

Professional Development

25 Qs

Data Protection

Data Protection

Professional Development

25 Qs

BPPTIK CSA

BPPTIK CSA

Professional Development

30 Qs

ICT554 - STORAGE & SECURITY MANAGEMENT

ICT554 - STORAGE & SECURITY MANAGEMENT

University - Professional Development

30 Qs

CSTP Apprenticeship Standard Quiz

CSTP Apprenticeship Standard Quiz

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Storm Rae

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the level of autonomy a cyber security technical professional is expected to have?

A considerable degree of autonomy

No autonomy

Minimal autonomy

Only works under direct supervision

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important for a cyber security technical professional to work in accordance with applicable laws, regulations, standards, and ethics?

To ensure their actions are legal and ethical while managing cyber security risks

To avoid working overtime

To increase the number of job roles available

To reduce the need for technical skills

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What knowledge is required to design, build, configure, optimise, test, and troubleshoot simple and complex networks?

Operating system principles and exploits

Network foundations, protocols, and server virtualisation

System development methodologies

Human dimensions of cyber security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the management of cyber security risk?

Management of cyber security risk, tools and techniques

Application of SIEM tools and techniques

Legal responsibilities of system owners

Assurance concepts and approaches

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept is essential when applying a management system and developing an information security management plan?

Concepts & benefits of security management systems, governance & international standards

Application of SIEM tools

Legal responsibilities of employees

Assurance concepts and approaches

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key aspect of configuring and using security technology components and key management?

Security components: how they are used for security/business benefit. Crypto & key management

Legal, regulatory, compliance environment

Assurance concepts and approaches

How to compose a justified security case

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of developing an assurance strategy?

Assurance concepts & approaches

Management of cyber security risk

Legal responsibilities of employers

Security components for business benefit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?