CompTIA Security+ SY0-601 Chapter 1 - 4

CompTIA Security+ SY0-601 Chapter 1 - 4

University

46 Qs

quiz-placeholder

Similar activities

Sinh Học 11-CHKI

Sinh Học 11-CHKI

1st Grade - University

50 Qs

Exam

Exam

University

42 Qs

XIRPL2_PASQUIZZ

XIRPL2_PASQUIZZ

1st Grade - Professional Development

50 Qs

Digital Marketing Test 1

Digital Marketing Test 1

University

50 Qs

UAS BSD 1

UAS BSD 1

University

45 Qs

Latihan UNBK TKJ 2019

Latihan UNBK TKJ 2019

10th Grade - University

50 Qs

Round 1 Code2duo

Round 1 Code2duo

University

44 Qs

VOIP XII

VOIP XII

1st Grade - University

50 Qs

CompTIA Security+ SY0-601 Chapter 1 - 4

CompTIA Security+ SY0-601 Chapter 1 - 4

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Christopher Wilson

Used 15+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

46 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Someone put malware on your computer that records all of your keystrokes. What aspect of security was primarily attacked?

Confidentiality
Integrity
Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of control would a security assessment procedure be?

Management
Operational
Physical
Technical

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Malware is a common example of a threat vector.

true
false

4.

MULTIPLE SELECT QUESTION

30 sec • 5 pts

Which controls primarily protect data integrity?

Backups
Encryption
Fault tolerance
Hashing
Need to know

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A security program alerts you of a failed login attempt to a secure system. On investigation, you learn the system’s regular user accidentally had caps lock turned on. What kind of alert was it?

True positive
True negative
False positive
False negative

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A new privacy law demands more robust protection for your customer database. First, you researched database security products to find which would reliably meet your needs. Now that you’ve selected and installed one, you’re currently training administrators to perform integrity checks, update the software, and review logs for suspicious activities. What are you practicing?

Due care
Due diligence
Negligence
Regulatory compliance

7.

MULTIPLE SELECT QUESTION

30 sec • 5 pts

Your internal network is protected from internet attacks by a Cisco firewall. To improve security, your supervisor suggests installing a Fortinet firewall between the Cisco firewall and the trusted LAN, then using the space between as a perimeter network. Which security principles does this promote?

Availability
Defense in depth
Security by design
Security by obscurity
Vendor diversity

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?