Search Header Logo

CompTIA Security (Security and Risk Fundamentals)

Authored by Miftah Rahman

Computers, Professional Development

Professional Development

Used 18+ times

CompTIA Security (Security and Risk Fundamentals)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any condition that leaves a device open to harm is a terminology of ...

Vulnerabilities

Risk

Exploit

Threat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Creating a security policy is ... type of control

Prevention

Detection

Deterrence

Correction

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

using encryption is one of ... implementation

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which authentication types that using fingerprint

something you are

something you know

something you have

somewhere you are

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should encoded and unreadable data be called?

decode text

cipher text

secret text

clear text

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hiring IT vendor to help organization business process is is type of which risk control?

Transfer Risk

Avoid Risk

Reduce Risk

Accept Risk

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Company decide to do some security training in order to harden their security infrastructure, which type of control is this method?

Technical Control

Management Control

Operational Control

Damage Control

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?