A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of the following access control schemes would be BEST for the company to implement?
CompTIA Sec+

Quiz
•
Computers
•
University - Professional Development
•
Hard
Miftah Rahman
Used 118+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Discretionary
Rule-based
Role-based
Mandatory
2.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?
Install a NIDS device at the boundary.
Segment the network with firewalls.
Update all antivirus signatures daily.
Implement application blacklisting.
3.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office. Priority must be given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?
Nmap
Heat Map
Network DIagrams
Wireshark
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?
Incident Response
COmmunications
Disaster Recovery
Data Retention
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy?
Mobile device management
Full-device encryption
Remote wipe
Biometrics
6.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?
Predictability
Key STretching
Salting
Hashing
7.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider. Which of the following risk management strategies is this an example of?
Acceptance
Mitigation
Avoidance
Transference
Create a free account and access millions of resources
Similar Resources on Quizizz
19 questions
Computer Security Measures

Quiz
•
12th Grade - University
20 questions
Principles of Security

Quiz
•
University
19 questions
Big Data

Quiz
•
5th Grade - Professio...
15 questions
Project Management

Quiz
•
University
20 questions
Financial Management Midterm Quiz #2

Quiz
•
University
15 questions
security+ (601)

Quiz
•
9th Grade - Professio...
20 questions
Business Finance Endterm Quiz #3

Quiz
•
University
22 questions
Revision Project Management in IT Final Exam MCQs

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade