Cybersecurity LinkedIn Skill Assessment Answer 2022
Q1. According to the shared responsibility model, which cloud computing model places the most responsibility on the cloud service provider (CSP)?
2 min readOct 19, 2022
- Hybrid Cloud
- Software as a Service (SaaS)
- Platform as a Service (PaaS)
- Infrastructure as a Service (IaaS)
Q2. Which option removes the risk of multitenancy in cloud computing?
- PaaS
- public cloud
- private cloud
- IaaS
Q3. Your organization recently implemented a unified messaging solution and VoIP phones on every desktop. You are responsible for researching the vulnerabilities of the VoIP system. Which type of attack are VoIP phones most vulnerable to experiencing?
- denial-of-service
- brute force attacks
- malware
- buffer overflow
Q4. Which security control cannot produce an active response to a security event?
- cloud access security broker (CASB)
- intrusion prevention system (IPS)
- intrusion detection system (IDS)
- next generation firewall
An intrusion detection system (IDS
) is a device or software application that monitors a network or systems for malicious activity or policy violations.
Q5. Packet sniffer is also called _.
- SIEM
- UTM
- protocol analyzer
- data sink
Q6. Which option tests code while it is in operation?
- code review
- code analysis
- static analysis
- dynamic analysis
Q7. Which option describes testing that individual software developers can conduct on their own code?
- gray box testing
- integration testing
- white box testing
- unit testing
Q8. In black box penetration testing, what information is provided to the tester about the target environment?
- none
- limited details of server and network infrastructure
- all information
- limited details of server infrastructure
Q9. Which security control can best protect against shadow IT by identifying and preventing use of unsanctioned cloud apps and services?
- intrusion prevention system (IPS)
- next generation firewall
- cloud access security broker (CASB)
- intrusion detection system (IDS)
Q10. Which option describes the best defense against collusion?
- monitoring of normal employee system and data access patterns
- applying system and application updates regularly
- fault tolerant infrastructure and data redundancy
- separation of duties and job rotation
for more question and answers