Mastering Security Basics

Mastering Security Basics

Professional Development

15 Qs

quiz-placeholder

Similar activities

Objetivos generales de etapa

Objetivos generales de etapa

Professional Development

13 Qs

Faculty Seminar

Faculty Seminar

Professional Development

10 Qs

Recap 2

Recap 2

Professional Development

14 Qs

2PM Pub Quiz Sample Questions

2PM Pub Quiz Sample Questions

Professional Development

15 Qs

Silver Label Course 301-302

Silver Label Course 301-302

Professional Development

15 Qs

Managing Projects

Managing Projects

Professional Development

10 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

MOS Transistor quiz 1

MOS Transistor quiz 1

Professional Development

20 Qs

Mastering Security Basics

Mastering Security Basics

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Alan Shepard

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solution?

Use hashes

Encrypt it before sending

Protect it with a digital signature

Use RAID

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

George manages network devices in his store and maintains copies of the configuration files for all the managed routers and switches. On a weekly basis, he creates hashes for these files and compares them from the previous week. Wich is he most likely using?

confidentiality

integrity

encryption

availability

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Louie hid several plaintext documents within an image file. He then sent the image file to Tony. Which of the following BEST describes the purpose of his actions?

To support steganography

To support integrity

To support availability

To support obfuscation

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Management has mandated the use of digital signatures by all personnel. Which of the following use cases does this primarily support?

Confidentiality

Availability

Obfuscation

Non-repudiation

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

As the security manager, Marge is implementing a security program. She has included security controls to address confidentiality and availability. Of the choices, what else should be included?

Ensure critical systems provide uninterrupted service

Protect data-in-transit from unauthorized disclosure

Ensure systems are not susceptible to unauthorized changes

Secure data to prevent unauthorized disclosure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization wants to reduce the amount of money it is losing due to thefts. Which of the following is the BEST example of an equipment theft deterrent?

Snapshots

Cable Locks

Strong passwords

Persistent VDI

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your organization is considering virtualization solutions. Management wants to ensure that any solution provides the best ROI. Which of the following situations indicates that virtualization would provide the best ROI?

Most physical servers within the organization are currently utilized at close to 100 percent

The organization has many servers that do not require failover services.

Most desktop PCs require fast processors and high amount of memory

Most physical servers within the organization are currently underutilized

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?