Search test library by skills or roles
⌘ K

About the test:

Cybersikkerhedsvurderingstesten evaluerer kandidater om grundlæggende cybersikkerhed (operativsystemer, computernetværk og skybegreber), deres evne til at opdage sikkerhedsrisici i eksisterende systemer (SQL -injektioner, malware, virus, trojaner), opsætningsvagter mod fremtidige cyberangreb ( DDoS, proxy -servere, VPN'er, firewalls) og brug kryptografiteknikker (hashing, digitale signaturer).

Covered skills:

  • Netværkssikkerhed (protokoller; TLS; firewalls; Port -scanninger)
  • Kryptografi (hash; SSL; https)
  • XSS)
  • Malware (trojanere; adware; rootkits)
  • Data -styring
  • Risikovurderinger
  • Cybersikkerhedsangreb (mand-i-midten; DOS/DDoS; netværksangreb)
  • Websikkerhed (SQL -injektioner
  • E -mail -sikkerhed (phishing)
  • Datasikkerhed (patches; kryptering; sikkerhedskopieringer)
  • Cybersecurity -forsvar
  • Netværkstest (penetrationstest)

9 reasons why
9 reasons why

Adaface Cyber Security Test is the most accurate way to shortlist Cybersikkerhedsanalytikers



Reason #1

Tests for on-the-job skills

The Cyber Security Assessment Test helps recruiters and hiring managers identify qualified candidates from a pool of resumes, and helps in taking objective hiring decisions. It reduces the administrative overhead of interviewing too many candidates and saves time by filtering out unqualified candidates at the first step of the hiring process.

The test screens for the following skills that hiring managers look for in candidates:

  • Evne til at identificere og implementere sikre protokoller i netværkssikkerhed
  • Evne til at konfigurere og styre firewalls til at beskytte netværksinfrastruktur
  • Evne til at opdage og forhindre mand-i-midten angreb
  • Evne til at afbøde DOS/DDoS -angreb i et netværk
  • Kendskab til forskellige netværksangreb og deres forebyggelsesmetoder
  • Forståelse af kryptografiske koncepter og evne til at bruge hashing -algoritmer
  • Kendskab til SSL og dens implementering for sikker kommunikation
  • Evne til at implementere HTTPS til sikker webbrowsing
  • Forståelse af almindelige sårbarheder til websikkerhed som SQL -injektioner og XSS
  • Kendskab til e -mail -sikkerhedspraksis og evne til at opdage phishing -forsøg
  • Kendskab til forskellige typer malware og evne til at identificere og fjerne dem
  • Evne til at implementere datasikkerhedsforanstaltninger som patches, kryptering og sikkerhedskopier
  • Forståelse af principper for datastyring og dets betydning i cybersikkerhed
  • Kendskab til forskellige cybersikkerhedsforsvarsmekanismer og deres implementering
  • Evne til at foretage risikovurderinger for at identificere potentielle sårbarheder
  • Færdighed i udførelse af netværkstest, herunder penetrationstest
Reason #2

No trick questions

no trick questions

Traditional assessment tools use trick questions and puzzles for the screening, which creates a lot of frustration among candidates about having to go through irrelevant screening assessments.

View sample questions

The main reason we started Adaface is that traditional pre-employment assessment platforms are not a fair way for companies to evaluate candidates. At Adaface, our mission is to help companies find great candidates by assessing on-the-job skills required for a role.

Why we started Adaface
Reason #3

Non-googleable questions

We have a very high focus on the quality of questions that test for on-the-job skills. Every question is non-googleable and we have a very high bar for the level of subject matter experts we onboard to create these questions. We have crawlers to check if any of the questions are leaked online. If/ when a question gets leaked, we get an alert. We change the question for you & let you know.

How we design questions

Dette er kun en lille prøve fra vores bibliotek med 10.000+ spørgsmål. De faktiske spørgsmål om dette Cyber ​​Security Assessment Test vil være ikke-gåbart.

🧐 Question

Medium

Cookie Security Analysis
Web Application Security
HTTP Cookies
Cross-Domain Communication
Solve
You are a cybersecurity officer and a new third-party payment gateway is integrated into your company's e-commerce website. The payment gateway API is hosted on a different domain (pay-gateway.com) than your e-commerce site (my-ecommerce.com). You receive some reports that users are unable to complete their transactions intermittently. 

You obtain the following set of HTTP cookies from an affected user:

1. user_session=1; Domain=my-ecommerce.com; Path=/; Secure; HttpOnly
2. payment_session=xyz123; Domain=pay-gateway.com; Path=/; Secure; HttpOnly
3. cart_id=abcd1234; Domain=my-ecommerce.com; Path=/; Secure
4. csrf_token=efgh5678; Domain=my-ecommerce.com; Path=/; Secure
5. currency=USD; Domain=my-ecommerce.com; Path=/;
6. same_site_test=1; Domain=my-ecommerce.com; Path=/; Secure; SameSite=None
7. payment_verification=; Domain=my-ecommerce.com; Path=/; Secure; HttpOnly

Which of the following configuration modifications would likely solve the intermittent transaction failure issue?
A: Set SameSite=Strict attribute on all cookies.
B: Set "SameSite=None; Secure" attribute on the payment_session cookie.
C: Change the Domain attribute of payment_session cookie to my-ecommerce.com.
D: Set HttpOnly attribute on cart_id and csrf_token cookies.
E: Remove Secure attribute from user_session cookie.

Medium

Security Incident
Log Analysis
Solve
You are the security analyst for a company and are currently investigating a security incident. You found the following log entries in your HTTP server logs, which appear to be linked to the incident:

1. 192.0.2.4 - - [24/May/2023:13:15:30 +0000] "GET /wp-login.php HTTP/1.1" 200 167 "-" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; yie8)"
2. 192.0.2.4 - - [24/May/2023:13:15:31 +0000] "POST /wp-login.php HTTP/1.1" 302 152 "http://www.example.com/wp-login.php" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; yie8)"
3. 192.0.2.4 - - [24/May/2023:13:15:32 +0000] "GET /wp-admin/install.php HTTP/1.1" 200 125 "http://www.example.com/wp-admin/" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; yie8)"

Based on this information, which of the following statements are correct?
A: The attacker was unable to compromise the Wordpress login page but was successful in accessing the installation page.
B: The attacker attempted to login to a Wordpress site and, despite the login failing, was able to access the Wordpress installation page.
C: The attacker was attempting a dictionary attack on the Wordpress site and accessed the Wordpress installation page.
D: The logs indicate that the attacker was able to compromise the Wordpress login and directly access the installation page.
E: The attacker attempted to login to a Wordpress site, succeeded, and then tried to access the Wordpress installation page.

Medium

Network Traffic Anomaly
Network Traffic Analysis
Network Protocols
Solve
You are a cybersecurity engineer working on a network traffic analysis case. You have been given the following set of observations from network logs of the past 24 hours:

- Observation 1: 1,000,000 DNS requests were recorded, 50% more than the usual daily traffic.
- Observation 2: 85% of these DNS requests have the same subdomain but different domain names.
- Observation 3: For each of these DNS requests, an HTTP POST request follows immediately.
- Observation 4: No other significant anomalies were detected in the system logs.

Given these observations, what would you suspect is happening?
A: The network is experiencing a DNS amplification attack
B: There is a misconfiguration in the DNS settings
C: The system is the source of a SYN flood attack
D: A fast-flux DNS network is in operation
E: The system is infected with a DNS tunneling based malware

Medium

SQL Log Analysis
SQL Injection
Log Analysis
Solve
You are investigating a possible SQL injection attack on your company's web application. You found the following entries in the HTTP server logs:

Note that each log line contains the following information:

IP Address - Timestamp - Request URI - Request Status - Response Size
 image
Based on the log entries, which of the following statements are correct?
A: The attacker logged in successfully but failed to execute the SQL injection.
B: The attacker failed in the SQL injection attack.
C: The attacker failed to login but successfully accessed the admin page.
D: The attacker performed a successful SQL injection attack that dumped all product information.
E: The attacker was unsuccessful in both the SQL injection attack and the login attempt.

Medium

Misappropriation Post-Migration
DNS Management
Infrastructure Migration
Subdomain Hijacking
Solve
A software company decided to move some of their web services from one cloud provider (Vendor A) to another (Vendor B) for better cost optimization. Initially, their main web application "webapp.company.com" was hosted at IP 192.0.2.1 on Vendor A's infrastructure. As part of this transition, it was moved to IP 203.0.113.1 on Vendor B's setup. Subsequently, a secondary web service previously hosted on "serviceA.company.com" at IP 192.0.2.2 (Vendor A), was migrated and re-hosted at "serviceB.company.com" at IP 203.0.113.2 (Vendor B).

A month post-migration, the SEO team reported an unexpected spike in organic traffic to the "company.com" domain. Upon investigating, the IT team noticed unusual activity related to "serviceA.company.com" in the server access logs, including successful HTTP 200 responses from several requests. A suspicious HTTPS GET request, `GET /explicit-content.html HTTP/1.1`, was also recorded.

Running `dig +short serviceA.company.com` returned IP address 198.51.100.1. Cross-checking this information with the company's DNS records revealed:
 image
Based on the details provided, identify the probable cause for the unexpected increase in organic traffic:
A: The company failed to delete the DNS "A" record for "serviceB.company.com" before migration on vendor A.
B: The company failed to delete the DNS "A" record for "serviceA.company.com" after migration.
C: The company did not configure DNS record for webapp.company.com properly on Vendor B's platform.
D: The DNS configuration for serviceB.company.com is incorrect post migration
🧐 Question🔧 Skill

Medium

Cookie Security Analysis
Web Application Security
HTTP Cookies
Cross-Domain Communication

2 mins

Cyber Security
Solve

Medium

Security Incident
Log Analysis

2 mins

Cyber Security
Solve

Medium

Network Traffic Anomaly
Network Traffic Analysis
Network Protocols

2 mins

Cyber Security
Solve

Medium

SQL Log Analysis
SQL Injection
Log Analysis

2 mins

Cyber Security
Solve

Medium

Misappropriation Post-Migration
DNS Management
Infrastructure Migration
Subdomain Hijacking

3 mins

Cyber Security
Solve
🧐 Question🔧 Skill💪 Difficulty⌛ Time
Cookie Security Analysis
Web Application Security
HTTP Cookies
Cross-Domain Communication
Cyber Security
Medium2 mins
Solve
Security Incident
Log Analysis
Cyber Security
Medium2 mins
Solve
Network Traffic Anomaly
Network Traffic Analysis
Network Protocols
Cyber Security
Medium2 mins
Solve
SQL Log Analysis
SQL Injection
Log Analysis
Cyber Security
Medium2 mins
Solve
Misappropriation Post-Migration
DNS Management
Infrastructure Migration
Subdomain Hijacking
Cyber Security
Medium3 mins
Solve
Reason #4

1200+ customers in 75 countries

customers in 75 countries
Brandon

Med Adaface var vi i stand til at optimere vores indledende screeningsproces med op mod 75 %, hvilket frigjorde kostbar tid for både ansættelsesledere og vores talentanskaffelsesteam!


Brandon Lee, Leder af mennesker, Love, Bonito

Reason #5

Designed for elimination, not selection

The most important thing while implementing the pre-employment Cyber ​​Security Assessment Test in your hiring process is that it is an elimination tool, not a selection tool. In other words: you want to use the test to eliminate the candidates who do poorly on the test, not to select the candidates who come out at the top. While they are super valuable, pre-employment tests do not paint the entire picture of a candidate’s abilities, knowledge, and motivations. Multiple easy questions are more predictive of a candidate's ability than fewer hard questions. Harder questions are often "trick" based questions, which do not provide any meaningful signal about the candidate's skillset.

Science behind Adaface tests
Reason #6

1 click candidate invites

Email invites: You can send candidates an email invite to the Cyber ​​Security Assessment Test from your dashboard by entering their email address.

Public link: You can create a public link for each test that you can share with candidates.

API or integrations: You can invite candidates directly from your ATS by using our pre-built integrations with popular ATS systems or building a custom integration with your in-house ATS.

invite candidates
Reason #7

Detailed scorecards & benchmarks

Reason #7

Detailed scorecards & benchmarks

Along with scorecards that report the performance of the candidate in detail, you also receive a comparative analysis against the company average and industry standards.

View sample scorecard
Reason #8

High completion rate

Adaface tests are conversational, low-stress, and take just 25-40 mins to complete.

This is why Adaface has the highest test-completion rate (86%), which is more than 2x better than traditional assessments.

test completion rate
Reason #9

Advanced Proctoring


Learn more

About the Cyber Security Online Test

Why you should use Pre-employment Cyber Security Assessment Test?

The Cyber ​​Security Assessment Test makes use of scenario-based questions to test for on-the-job skills as opposed to theoretical knowledge, ensuring that candidates who do well on this screening test have the relavant skills. The questions are designed to covered following on-the-job aspects:

  • Forståelse og implementering af netværkssikkerhedsprotokoller såsom TLS og firewalls
  • Gennemfører PORT -scanninger for at vurdere sårbarheder
  • Identificering og forsvar mod cybersecurity-angreb som mand-i-midten, DOS/DDoS og netværksangreb
  • Anvendelse af krypteringsteknikker og forståelse af hashing -algoritmer til kryptografi
  • Implementering af SSL og HTTPS til sikker webkommunikation
  • Forebyggelse af websikkerhedstrusler såsom SQL -injektioner og XSS -angreb

Once the test is sent to a candidate, the candidate receives a link in email to take the test. For each candidate, you will receive a detailed report with skills breakdown and benchmarks to shortlist the top candidates from your pool.

What topics are covered in the Cyber Security Assessment Test?

  • cybersecurity -angreb

    Cybersikkerhedsangreb er ondsindede aktiviteter, der er målrettet mod at udnytte sårbarheder i computersystemer eller netværk. Disse angreb omfatter forskellige former, såsom mand-i-midten angreb, DOS/DDoS-angreb og netværksangreb. Det er vigtigt at vurdere denne færdighed for at evaluere en kandidats evne til at identificere, forhindre og afbøde cybertrusler.

  • kryptografi </H4> <p> kryptografi involverer teknikker til at sikre kommunikation og datalagring ved at omdanne information til et format Det er uforståeligt for uautoriserede personer. Hashing, SSL og HTTPS er kryptografiske foranstaltninger, der bruges til at sikre dataintegritet, fortrolighed og godkendelse. Evaluering af en kandidats viden om kryptografi er afgørende for at vurdere deres evne til at beskytte følsomme oplysninger. </p> <h4> websikkerhed

    websikkerhed fokuserer på at forhindre og afbøde sårbarheder og trusler, der specifikt er målrettet mod webapplikationer. Det inkluderer foranstaltninger til at afbøde almindelige webbaserede angreb, såsom SQL-injektioner og scripting på tværs af stedet (XSS). At måle en kandidats ekspertise inden for websikkerhed er vigtig for at sikre, at beskyttelsen af ​​onlineoplysninger og forhindrer uautoriseret adgang.

  • e -mail -sikkerhed

    E -mail -sikkerhed refererer til beskyttelse af e -mail -kommunikation fra cybertrusler, især phishing -angreb. Det er vigtigt at vurdere en kandidats forståelse af e -mail -sikkerhed for at sikre, at de besidder den viden og de færdigheder, der er nødvendige for Område af ondsindet software designet til at skade eller udnytte computersystemer eller netværk. Dette inkluderer trojanere, adware og rodkits. Evaluering af en kandidats viden om malware er vigtig for at bestemme deres evne til at registrere, analysere og afbøde disse skadelige programmer.

  • datasikkerhed

    Datasikkerhed involverer beskyttelse af data mod uautoriseret adgang, ændring, ændring, ændring, ændring, ændring, ændring, ændring, eller ødelæggelse. Det inkluderer implementering af sikkerhedsrettelser, anvendelse af krypteringsteknikker og etablering af regelmæssige data om data. Evaluering af en kandidats færdigheder i datasikkerhed er afgørende for at opretholde fortrolighed, integritet og tilgængelighed af følsom information.

  • Data Governance

    Data Governance refererer til den samlede styring af datakvalitet, sikkerhed, sikkerhed, sikkerhed, sikkerhed, sikkerhed, sikkerhed, sikkerhed, sikkerhed, sikkerhed, sikkerhed, sikkerhed, sikkerhed og privatliv i en organisation. Det omfatter etablering af politikker, procedurer og kontroller for at sikre passende håndtering og brug af data. At vurdere en kandidats forståelse af datastyring er vigtig for at sikre overholdelse af regler og opretholdelse af dataets integritet.

  • cybersecurity -forsvar

    Cybersikkerhedsforsvar involverer implementering af beskyttelsesforanstaltninger og strategier til beskyttelse af computersystemer og netværk fra cybertrusler. Disse forsvar kan omfatte firewalls, indtrængningsdetektionssystemer, antivirus -software og adgangskontrol. Evaluering af en kandidats viden om cybersikkerhedsforsvar er afgørende for at vurdere deres evne til at implementere og opretholde effektive sikkerhedsforanstaltninger.

  • risikovurderinger

    risikovurderinger involverer at identificere, analysere og evaluere potentielle risici og sårbarheder relateret til informationssystemer. Dette inkluderer vurdering af sandsynligheden og potentiel indvirkning af forskellige trusler og bestemmelse af passende afbødningsstrategier. At vurdere en kandidats færdigheder i risikovurderinger er afgørende for at sikre proaktiv identifikation og styring af cybersikkerhedsrisici.

  • netværkstest (penetrationstest)

    Netværkstest, specifikt penetrationstest, involverer evaluering af sikkerheden af et computernetværk ved at forsøge at udnytte sårbarheder. Dette simulerer scenarier i den virkelige verden for at identificere svagheder og udvikle strategier til forbedring. Evaluering af en kandidats evne til at gennemføre netværkstest giver indsigt i deres færdigheder i at identificere og afbøde netværkssårbarheder.

  • Full list of covered topics

    The actual topics of the questions in the final test will depend on your job description and requirements. However, here's a list of topics you can expect the questions for Cyber ​​Security Assessment Test to be based on.

    Protokoller
    Tls
    Firewalls
    Port scanninger
    Mand-i-midten angreb
    DOS/DDoS -angreb
    Netværksangreb
    Kryptografi
    Hashing algoritmer
    SSL
    Https
    Websikkerhed
    SQL -injektioner
    XSS
    E -mail -sikkerhed
    Phishing
    Malware
    Trojanere
    Adware
    Rootkits
    Datasikkerhed
    Patches
    Kryptering
    Sikkerhedskopier
    Data -styring
    Cybersecurity -forsvar
    Risikovurderinger
    Penetrationstest

What roles can I use the Cyber Security Assessment Test for?

  • Cybersikkerhedsanalytiker
  • Sikkerhedsingeniør
  • Netværksadministrator
  • Penetrationstester
  • Sikkerhedskonsulent
  • Chief Information Security Officer (CISO)
  • IT -revisor
  • Sikkerhedsarkitekt
  • Sikkerhedsoperationscenter (SOC) analytiker

How is the Cyber Security Assessment Test customized for senior candidates?

For intermediate/ experienced candidates, we customize the assessment questions to include advanced topics and increase the difficulty level of the questions. This might include adding questions on topics like

  • Anerkendelse og beskyttelse mod e -mail -phishing -angreb
  • Identificering og bekæmpelse af forskellige typer malware inklusive trojanere, adware og rootkits
  • Implementering af datasikkerhedsforanstaltninger som patches, kryptering og sikkerhedskopier
  • Forståelse af vigtigheden af ​​datastyring i opretholdelsen af ​​datasikkerhed
  • Implementering af effektiv cybersikkerhedsforsvar for at beskytte systemer og netværk
  • Udførelse af risikovurderinger for at identificere potentielle sårbarheder og afbøde risici
  • Gennemførelse af netværkstest såsom penetrationstest for at vurdere systemsikkerhed
Singapore government logo

Ansættelseslederne mente, at de gennem de tekniske spørgsmål, som de stillede under panelinterviewene, var i stand til at fortælle, hvilke kandidater der havde bedre score, og differentieret med dem, der ikke scorede så godt. De er meget tilfreds med kvaliteten af ​​de kandidater, der er nomineret med Adaface-screeningen.


85%
Reduktion i screeningstid

Cyber Security Hiring Test Ofte stillede spørgsmål

Kan jeg evaluere viden om cybersikkerhed og computernetværk i den samme test?

Ja. Vores standard cybersikkerhedstest evaluerer kandidater om netværksfundament. Du kan også få en brugerdefineret test for at få flere spørgsmål fokuseret på computernetværk. Du kan gennemgå vores computernetværkstest for at få en fornemmelse af, hvilken slags spørgsmål der vil blive brugt til at evaluere computernetværkskoncepter.

Hvordan tilpasses testen til junior cyber -sikkerhedsfolk?

Testen vil have lettere spørgsmål, og emnerne vil være fokuseret på det grundlæggende om cybersikkerhedsangreb, netværk og forsvar. Testen kan også omfatte spørgsmål til at vurdere grundlæggende tekniske egnethedsfærdigheder afhængigt af din jobbeskrivelse.

Kan jeg evaluere tekniske/ kodende færdigheder i den samme test?

Ja. Vores standard cybersikkerhedstest inkluderer ikke kodningsspørgsmål, men hvis din jobbeskrivelse kræver, at kandidaten har praktiske kodningsevner, kan du få en tilpasset test med kodningsspørgsmål.

Hvad kandidater til cybersikkerhedsgrænse for at teste kandidater til?

Cybersecurity -egnethedstestskærme kandidater til deres viden og evne til at anvende grundlæggende cybersikkerhedsprincipper. Testen dækker emner som netværkssikkerhed, computersikkerhed og informationssikkerhed. Det måler også en kandidats evne til at tænke kritisk over cybersikkerhedsspørgsmål og identificere og løse problemer.

Kan jeg kombinere flere færdigheder i en brugerdefineret vurdering?

Ja absolut. Brugerdefinerede vurderinger er oprettet baseret på din jobbeskrivelse og vil omfatte spørgsmål om alle must-have-færdigheder, du angiver.

Har du nogen anti-cheating eller proctoring-funktioner på plads?

Vi har følgende anti-cheating-funktioner på plads:

  • Ikke-gåbare spørgsmål
  • IP Proctoring
  • Webproctoring
  • Webcam Proctoring
  • Detektion af plagiering
  • Sikker browser

Læs mere om Proctoring Features.

Hvordan fortolker jeg testresultater?

Den primære ting at huske på er, at en vurdering er et elimineringsværktøj, ikke et udvælgelsesværktøj. En færdighedsvurdering er optimeret for at hjælpe dig med at eliminere kandidater, der ikke er teknisk kvalificerede til rollen, den er ikke optimeret til at hjælpe dig med at finde den bedste kandidat til rollen. Så den ideelle måde at bruge en vurdering på er at beslutte en tærskelværdi (typisk 55%, vi hjælper dig med benchmark) og inviterer alle kandidater, der scorer over tærsklen for de næste interviewrunder.

Hvilken oplevelsesniveau kan jeg bruge denne test til?

Hver Adaface -vurdering tilpasses til din jobbeskrivelse/ ideel kandidatperson (vores emneeksperter vælger de rigtige spørgsmål til din vurdering fra vores bibliotek på 10000+ spørgsmål). Denne vurdering kan tilpasses til ethvert erfaringsniveau.

Får hver kandidat de samme spørgsmål?

Ja, det gør det meget lettere for dig at sammenligne kandidater. Valgmuligheder for MCQ -spørgsmål og rækkefølgen af ​​spørgsmål randomiseres. Vi har anti-cheating/proctoring funktioner på plads. I vores virksomhedsplan har vi også muligheden for at oprette flere versioner af den samme vurdering med spørgsmål om lignende vanskelighedsniveauer.

Jeg er kandidat. Kan jeg prøve en øvelsestest?

Nej. Desværre understøtter vi ikke praksisforsøg i øjeblikket. Du kan dog bruge vores eksempler på spørgsmål til praksis.

Hvad er omkostningerne ved at bruge denne test?

Du kan tjekke vores prisplaner.

Kan jeg få en gratis prøve?

Ja, du kan tilmelde dig gratis og forhåndsvise denne test.

Jeg flyttede lige til en betalt plan. Hvordan kan jeg anmode om en brugerdefineret vurdering?

Her er en hurtig guide til hvordan man anmoder om en brugerdefineret vurdering på adaface.

customers across world
Join 1200+ companies in 75+ countries.
Prøv det mest kandidatvenlige færdighedsvurderingsværktøj i dag.
g2 badges
Ready to use the Adaface Cyber ​​Security Assessment Test?
Ready to use the Adaface Cyber ​​Security Assessment Test?
logo
40 min tests.
No trick questions.
Accurate shortlisting.
Vilkår Privatliv Tillidsvejledning

🌎 Vælg dit sprog

English Norsk Dansk Deutsche Nederlands Svenska Français Español Chinese (简体中文) Italiano Japanese (日本語) Polskie Português Russian (русский)
ada
Ada
● Online
Previous
Score: NA
Next
✖️