
5.1 Security+ Knowledge Assessment Flashcard
Flashcard
•
Instructional Technology
•
Vocational training
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

24 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which access control model is based on the concept of least privilege and separation of duties? Options: Discretionary Access Control (DAC), Role-Based Access Control (RBAC), Mandatory Access Control (MAC), Attribute-Based Access Control (ABAC)
Back
Role-Based Access Control (RBAC)
Answer explanation
Role-Based Access Control (RBAC) is designed around the principles of least privilege and separation of duties, ensuring users have only the access necessary for their roles, thus enhancing security.
2.
FLASHCARD QUESTION
Front
Which network security protocol is primarily used to secure web traffic over the Internet?
Back
HTTPS
Answer explanation
HTTPS (Hypertext Transfer Protocol Secure) is the protocol used to secure web traffic over the Internet by encrypting data between the user's browser and the web server, ensuring privacy and data integrity.
3.
FLASHCARD QUESTION
Front
During which phase of the incident response process is evidence collected and preserved? Options: Preparation, Detection and Analysis, Containment, Eradication, and Recovery, Post-Incident Activity
Back
Containment, Eradication, and Recovery
Answer explanation
During the Containment, Eradication, and Recovery phase, evidence is collected and preserved to understand the incident and prevent future occurrences. This is crucial for effective incident response.
4.
FLASHCARD QUESTION
Front
Which of the following is a qualitative risk management strategy? Risk Avoidance, Risk Quantification, Risk Mitigation, Risk Transfer
Back
Risk Avoidance
Answer explanation
Risk Avoidance is a qualitative risk management strategy that involves eliminating the risk entirely, rather than trying to manage or transfer it. The other options focus on quantifying or mitigating risks, which are not qualitative.
5.
FLASHCARD QUESTION
Front
Which encryption technique uses two different keys for encryption and decryption?
Back
Asymmetric Encryption
Answer explanation
Asymmetric Encryption uses two different keys: a public key for encryption and a private key for decryption. This contrasts with Symmetric Encryption, which uses the same key for both processes.
6.
FLASHCARD QUESTION
Front
Which of the following is an example of a security policy? Firewall Configuration, Password Policy, Network Topology, Data Backup Schedule
Back
Password Policy
Answer explanation
A Password Policy is a security policy that defines rules for creating and managing passwords, ensuring security. In contrast, Firewall Configuration, Network Topology, and Data Backup Schedule are not classified as security policies.
7.
FLASHCARD QUESTION
Front
In the context of access control models, what does the principle of "separation of duties" aim to prevent?
Back
Conflict of interest
Answer explanation
The principle of 'separation of duties' aims to prevent conflict of interest by ensuring that no single individual has control over all aspects of a transaction, thereby reducing the risk of fraud and errors.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
26 questions
English Questions on Numbers and Verbs
Flashcard
•
KG - University
22 questions
Rainwater revision
Flashcard
•
Professional Development
15 questions
Flashcard - Unit Conversion and Practical Use
Flashcard
•
KG - University
20 questions
Mr Sun
Flashcard
•
KG
20 questions
Planes
Flashcard
•
University
22 questions
Ecosystem Structure & Function
Flashcard
•
University
20 questions
Ancient Indian Achievements Flashcard
Flashcard
•
KG - University
14 questions
Used To
Flashcard
•
University
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade