Security + Practice F

Security + Practice F

Professional Development

25 Qs

quiz-placeholder

Similar activities

Python

Python

Professional Development

20 Qs

Linux 1 - Introduction

Linux 1 - Introduction

Professional Development

20 Qs

Excel 02

Excel 02

Professional Development

20 Qs

6INFOMAN (Recitation)

6INFOMAN (Recitation)

University - Professional Development

20 Qs

C programming_Shivank

C programming_Shivank

Professional Development

20 Qs

Comunicación Visual

Comunicación Visual

University - Professional Development

20 Qs

Teclas rápidas de Excel

Teclas rápidas de Excel

Professional Development

24 Qs

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Professional Development

20 Qs

Security + Practice F

Security + Practice F

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Tyson Sigette

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is presented with the following items during the new-hire onboarding process:

-Laptop

-Secure USB drive

-Hardware OTP token

-External high-capacity HDD

-Password complexity policy

-Acceptable use policy

-HASP key

-Cable lock

Which of the following is one component of multifactor authentication?

Secure USB drive

Cable lock

Hardware OTP token

HASP key

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization requires users to provide their fingerprints to access an application. To improve security, the application developers intend to implement multifactor authentication. Which of the following should be implemented?

Use a camera for facial recognition

Have users sign their name naturally

Require a palm geometry scan

Implement iris recognition

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network technician is setting up a segmented network that will utilize a separate ISP to provide wireless access to the public area for a company. Which of the following wireless security methods should the technician implement to provide basic accountability for access to the public network?

Pre-shared key

Enterprise

Wi-Fi Protected setup

Captive portal

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a routine audit, a company discovers that engineering documents have been leaving the network on a particular port. The company must allow outbound traffic on this port, as it has a legitimate business use. Blocking the port would cause an outage. Which of the following technology controls should the company implement?

NAC

Web proxy

DLP

ACL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization's primary datacenter is experiencing a two-day outage due to an HVAC malfunction. The node located in the datacenter has lost power and is no longer operational, impacting the ability of all users to connect to the alternate datacenter. Which of the following BIA concepts BEST represents the risk described in this scenario?

SPoF

RTO

MTBF

MTTR

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst notices anomalous activity coming from several workstations in the organizations. Upon identifying and containing the issue, which of the following should the security analyst do NEXT?

Document and lock the workstations in a secure area to establish chain of custody

Notify the IT department that the workstations are to be reimaged and the data restored for reuse

Notify the IT department that the workstations may be reconnected to the network for the users to continue working

Document findings and processes in the after-action and lessons learned report

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee receives an email, which appears to be from the Chief Executive Officer (CEO), asking for a report of security credentials for all users.

Which of the following types of attack is MOST likely occurring?

Policy violation

Social engineering

Whaling

Spear phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?