CompTIA Security+ SY0-601 Chapter 1 - 4

CompTIA Security+ SY0-601 Chapter 1 - 4

University

46 Qs

quiz-placeholder

Similar activities

MES3093: QUIZ

MES3093: QUIZ

University

50 Qs

Computer memory

Computer memory

University

45 Qs

ALGORITHM AND FLOWCHART

ALGORITHM AND FLOWCHART

12th Grade - University

51 Qs

Ujian IoT PTS 2024 45 Soal

Ujian IoT PTS 2024 45 Soal

11th Grade - University

45 Qs

Midterm Exam - HCI

Midterm Exam - HCI

University

42 Qs

Usability-UXD

Usability-UXD

University

51 Qs

INTRO TO AI

INTRO TO AI

University

50 Qs

TIN HỌC KHỐI 5 HK1

TIN HỌC KHỐI 5 HK1

1st Grade - University

42 Qs

CompTIA Security+ SY0-601 Chapter 1 - 4

CompTIA Security+ SY0-601 Chapter 1 - 4

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Christopher Wilson

Used 15+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

46 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Someone put malware on your computer that records all of your keystrokes. What aspect of security was primarily attacked?

Confidentiality
Integrity
Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of control would a security assessment procedure be?

Management
Operational
Physical
Technical

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Malware is a common example of a threat vector.

true
false

4.

MULTIPLE SELECT QUESTION

30 sec • 5 pts

Which controls primarily protect data integrity?

Backups
Encryption
Fault tolerance
Hashing
Need to know

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A security program alerts you of a failed login attempt to a secure system. On investigation, you learn the system’s regular user accidentally had caps lock turned on. What kind of alert was it?

True positive
True negative
False positive
False negative

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A new privacy law demands more robust protection for your customer database. First, you researched database security products to find which would reliably meet your needs. Now that you’ve selected and installed one, you’re currently training administrators to perform integrity checks, update the software, and review logs for suspicious activities. What are you practicing?

Due care
Due diligence
Negligence
Regulatory compliance

7.

MULTIPLE SELECT QUESTION

30 sec • 5 pts

Your internal network is protected from internet attacks by a Cisco firewall. To improve security, your supervisor suggests installing a Fortinet firewall between the Cisco firewall and the trusted LAN, then using the space between as a perimeter network. Which security principles does this promote?

Availability
Defense in depth
Security by design
Security by obscurity
Vendor diversity

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?