Skip survey header

Sodexo BIIS Pre-Assessment

Please complete the pre-assessment below and submit when finished. Then, proceed to complete your ratings for the skills. The questions below are example-only questions not being scored by your manager. This pre-assessment is simply designed to provide you with a sense of what subjects will be covered and your baseline knowledge level coming into the course. 
This question requires a valid email address.
Threat Landscape & Terminology
1. What should a technician do once a problem (cyber issue) is tested and confirmed, as per the CompTIA troubleshooting methodology? *This question is required.
2. A technician is configuring a wireless router for a small office and the business owner would like the wireless network to be secured using the strongest encryption possible.  Which should the technician choose? *This question is required.
3. Which of the following is being used when a malicious actor searches various social media websites to find information about a company’s systems administrators and help desk staff? *This question is required.
Infrastructure
4. Which of the following are the basic computing operations? *This question is required.
5. A government agency with sensitive information wants to virtualize its infrastructure. Which of the following cloud deployment models BEST fits the agency’s needs? *This question is required.
6. A security administrator successfully used a tool to guess a six-digit code and retrieve the WPA master password from a SOHO access point. Which of the following should the administrator configure to prevent this type of attack? *This question is required.
Applications and Software
7. During a security audit of a company’s network, unsecure protocols were found to be in use. A network administrator wants to ensure browser-based access to company switches is using the most secure protocol. Which of the following protocols should be implemented? *This question is required.
8. Which of the following BEST describes an application running on a typical operating system? *This question is required.
9. Select one Electronic Medical Record (EMR) attribute: *This question is required.
Cybersecurity
10. Which of the following is an algorithm family that was developed for use cases in which power consumption and lower computing power are constraints? *This question is required.
11. Which of the following access management concepts is associated with file permissions? *This question is required.
12. A consumer purchases an exploit from the dark web. The exploit targets the online shopping cart of a popular website, allowing the shopper to modify the price of an item at checkout. Which of the following BEST describes this type of user? *This question is required.
Operations and Incident Response
13. An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing? *This question is required.
14. During a forensic investigation, which of the following must be addressed FIRST according to the order of volatility? *This question is required.
15. To determine the ALE of a particular risk, which of the following must be calculated? *This question is required.(Select TWO)
Governance, Risk, and Compliance
16. A security administrator is setting up a SIEM to help monitor for notable events across the enterprise. Which of the following control types does this BEST represent? *This question is required.
17. A Chief Information Security Officer (CISO) needs to create a policy set that meets international standards for data privacy and sharing. Which of the following should the CISO read and understand before writing the policies? *This question is required.
18. A company recently set up an e-commerce portal to sell its products online. The company wants to start accepting credit cards for payment, which requires compliance with a security standard. Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform? *This question is required.