A company intends to systematize its document access in a way that email marketing team would only be able to access and edit marketing-related documents, whereas the finance team could access only financial documents. What should the company implement to achieve this?

Security 701

Flashcard
•
Computers
•
Professional Development
•
Hard
Quizizz Content
FREE Resource
Student preview

37 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Back
Permission restrictions
Answer explanation
Implementing permission restrictions would allow a company to dictate who has access to specific documents, ensuring that members of a team only have access to the documents they need. Obfuscation is the hiding or camouflaging of information to prevent access to it. In this case, the data is available to be viewed for the people who have access to it. Data Sovereignty is the concept that the laws of the country in which the data is collected will control the ways in which the data can be used, processed, and stored. Countries may set regulations about information that is collected within the country. They can also set regulations about how businesses store and use Personal Identifying Information about citizens of their country even when the businesses are located in other countries. For example, if a business will be collecting information about citizens of the European Union (EU), the business must obey the EU’s laws regarding the storage, use, and processing of that data. Segmentation is the dividing of a network into subnetworks to improve security. It doesn't divide employees into sets of roles for the purpose of access.
2.
FLASHCARD QUESTION
Front
Which of the following is a primary security concern for a company setting up a BYOD program? A. End of life, B. Buffer overflow, C. VM escape, D. Jailbreaking
Back
Jailbreaking
Answer explanation
D. Jailbreaking is a primary security concern for a company setting up a BYOD (Bring Your Own Device) program. Jailbreaking is the process of removing the manufacturer’s or the carrier’s restrictions on a device, such as a smartphone or a tablet, to gain root access and install unauthorized or custom software. Jailbreaking can compromise the security of the device and the data stored on it, as well as expose it to malware, viruses, or hacking. Jailbreaking can also violate the warranty and the terms of service of the device, and make it incompatible with the company’s security policies and standards. Therefore, a company setting up a BYOD program should prohibit jailbreaking and enforce device compliance and encryption.
3.
FLASHCARD QUESTION
Front
A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider? A. Clustering servers B. Geographic dispersion C. Load balancers D. Off-site backups
Back
Geographic dispersion
Answer explanation
B. Geographic dispersion is a strategy that involves distributing the servers or data centers across different geographic locations. Geographic dispersion can help the company to mitigate the risk of weather events causing damage to the server room and downtime, as well as improve the availability, performance, and resilience of the network. Geographic dispersion can also enhance the disaster recovery and business continuity capabilities of the company, as it can provide backup and failover options in case of a regional outage or disruption12.
The other options are not the best ways to address the company’s concern:
Clustering servers: This is a technique that involves grouping multiple servers together to act as a single system. Clustering servers can help to improve the performance, scalability, and fault tolerance of the network, but it does not protect the servers from physical damage or downtime caused by weather events, especially if the servers are located in the same room or building3.
Load balancers: These are devices or software that distribute the network traffic or workload among multiple servers or resources. Load balancers can help to optimize the utilization, efficiency, and reliability of the network, but they do not prevent the servers from being damaged or disrupted by weather events, especially if the servers are located in the same room or building4.
Off-site backups: These are copies of data or files that are stored in a different location than the original source. Off-site backups can help to protect the data from being lost or corrupted by weather events, but they do not prevent the servers from being damaged or disrupted by weather events, nor do they ensure the availability or continuity of the network services.
4.
FLASHCARD QUESTION
Front
A security analyst reviews domain activity logs and notices the following Database Image. Which of the following is the best explanation for what the security analyst has discovered? A. The user jsmith's account has been locked out. B. A keylogger is installed on smith's workstation. C. An attacker is attempting to brute force ismith's account. D. Ransomware has been deployed in the domain.
Back
An attacker is attempting to brute force ismith's account.
Answer explanation
C. Brute force is a type of attack that tries to guess the password or other credentials of a user account by using a large number of possible combinations. An attacker can use automated tools or scripts to perform a brute force attack and gain unauthorized access to the account. The domain activity logs show that the user ismith has failed to log in 10 times in a row within a short period of time, which is a strong indicator of a brute force attack. The logs also show that the source IP address of the failed logins is different from the usual IP address of ismith, which suggests that the attacker is using a different device or location to launch the attack. The security analyst should take immediate action to block the attacker’s IP address, reset ismith’s password, and notify ismith of the incident.
5.
FLASHCARD QUESTION
Front
A security operations center determines that the malicious activity detected on a server is normal. Which of the following activities describes the act of ignoring detected activity in the future? Options: A. Tuning, B. Aggregating, C. Quarantining, D. Archiving
Back
Tuning
Answer explanation
A. Tuning is the activity of adjusting the configuration or parameters of a security tool or system to optimize its performance and reduce false positives or false negatives. Tuning can help to filter out the normal or benign activity that is detected by the security tool or system, and focus on the malicious or anomalous activity that requires further investigation or response. Tuning can also help to improve the efficiency and effectiveness of the security operations center by reducing the workload and alert fatigue of the analysts. Tuning is different from aggregating, which is the activity of collecting and combining data from multiple sources or sensors to provide a comprehensive view of the security posture. Tuning is also different from quarantining, which is the activity of isolating a potentially infected or compromised device or system from the rest of the network to prevent further damage or spread. Tuning is also different from archiving, which is the activity of storing and preserving historical data or records for future reference or compliance. The act of ignoring detected activity in the future that is deemed normal by the security operations center is an example of tuning, as it involves modifying the settings or rules of the security tool or system to exclude the activity from the detection scope.
6.
FLASHCARD QUESTION
Front
A systems administrator is looking for a low-cost application-hosting solution that is cloud-based. Which of the following meets these requirements? A. Serverless framework, B. Type 1 hypervisor, C. SD-WAN, D. SDN
Back
Serverless framework
Answer explanation
A. serverless framework is a cloud-based application-hosting solution that meets the requirements of low-cost and cloud-based. A serverless framework is a type of cloud computing service that allows developers to run applications without managing or provisioning any servers. A type 1 hypervisor, SD-WAN, and SDN are not cloud-based application-hosting solutions that meet the requirements of low-cost and cloud-based. A type 1 hypervisor is a software layer that runs directly on the hardware and creates multiple virtual machines that can run different operating systems and applications. SD-WAN (Software-Defined Wide Area Network) is a network architecture that uses software to dynamically route traffic across multiple WAN connections, such as broadband, LTE, or MPLS. SD-WAN is not a cloud-based service, but a network optimization technology that can improve the performance, reliability, and security of WAN connections. SDN (Software-Defined Networking) is a network architecture that decouples the control plane from the data plane, and uses a centralized controller to programmatically manage and configure the network devices and traffic flows. SDN is not a cloud-based service, but a network automation technology that can enhance the scalability, flexibility, and efficiency of the network.
7.
FLASHCARD QUESTION
Front
Which of the following should a systems administrator use to ensure an easy deployment of resources within the cloud provider? A. Software as a service, B. Infrastructure as code, C. Internet of Things, D. Software-defined networking
Back
Infrastructure as code
Answer explanation
B. Infrastructure as code (IaC) is a method of using code and automation to manage and provision cloud resources, such as servers, networks, storage, and applications. IaC allows for easy deployment, scalability, consistency, and repeatability of cloud environments. IaC is also a key component of DevSecOps, which integrates security into the development and operations processes.
Create a free account and access millions of resources
Similar Resources on Quizizz
40 questions
Cyber Security Awareness 2025

Flashcard
•
Professional Development
22 questions
Sec+ Day1 Security Concepts & Threat Types

Flashcard
•
Professional Development
30 questions
Security+ 701 Day 7 Governance and Recovery Flashcard

Flashcard
•
Professional Development
30 questions
ESTRUCTURA DE LA SEGURIDAD SOCIAL_2425_Tarde

Flashcard
•
KG
28 questions
CyberSecurity Training

Flashcard
•
Professional Development
33 questions
Analyze Stock Info Review

Flashcard
•
KG - University
38 questions
A+ 1102 Study Flashcard 1

Flashcard
•
Professional Development
33 questions
Security Analysis and Portfolio Management

Flashcard
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade