Mitigation Techniques and Controls

Mitigation Techniques and Controls

Professional Development

10 Qs

quiz-placeholder

Similar activities

Family Quizz

Family Quizz

5th Grade - Professional Development

15 Qs

Initial Assessment - Cybersecurity Awareness

Initial Assessment - Cybersecurity Awareness

9th Grade - Professional Development

10 Qs

Cycle 4: Session 8 Review.

Cycle 4: Session 8 Review.

Professional Development

12 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

M365 Security Pillar 1 (Identity & Access Management)

M365 Security Pillar 1 (Identity & Access Management)

Professional Development

10 Qs

Cloud computing

Cloud computing

Professional Development

10 Qs

aXQtMjktMTEtMjAyMg==

aXQtMjktMTEtMjAyMg==

Professional Development

10 Qs

CHFI-Post-Assessment

CHFI-Post-Assessment

Professional Development

10 Qs

Mitigation Techniques and Controls

Mitigation Techniques and Controls

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Usama Yehia Ibrahim

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have been directed by upper management to block employees from accessing Facebook from the corporate machines. Which would be the easiest way to exercise this control?

Application allow list

Application block list

DLP

Content filtering

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Having an expired certificate is an example of what type of error?

Mobile device management

Configuration

Application whitelisting

Content filter/URL filter

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A system-focused set of predetermined automation steps is an example of what?

Isolation

Runbook

Playbook

Firewall rules

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your business application server sends data to partners using encrypted (signed) messages. You hear from one of the partners that their messages have ceased coming. What should you investigate?

Application whitelist

Application blacklist

The playbook for the system

Configuration settings of the process

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have kiosk-based machines in the lobby and scattered through the facility. They do not require a login for guests to access certain items. What is the best way to protect these machines from users introducing trojans?

Application allow list

Application block list

Data loss prevention

Configuration settings of the process

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To coordinate team activities during an incident response event, what is the best way to communicate approved instructions?

Runbook

MDM solution

Quarantine rule

Playbook

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your security system has identified a specific executable as potentially dangerous. What is the best way to handle the specific item that was identified?

Segmentation

Quarantine

Firewall rule

Playbook

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?