Security+ Lesson1
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Medium
Alejandro Hidalgo
Used 27+ times
FREE Resource
Enhance your content in a minute
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company is developing an application in which a private US-based hospital will allow patients to access their medical records online. Regardless of what other data the application handles, what kind of compliance do you already know you need to research?
FISMA
FERPA
PCI DSS
HIPAA
Answer explanation
You need to research Health Insurance Portability and Accountability Act (HIPAA) compliance as it is a federal law designed to protect the health insurance coverage of workers who change or lose their jobs. The important part from an IT perspective is how it protects the privacy of patient records. HIPAA defines protected health information (PHI) and regulates how it can be used or disclosed. It also defines security standards for the storage and access of PHI.
2.
MULTIPLE SELECT QUESTION
1 min • 2 pts
The US government agency plans to migrate some of its internally hosted data to a cloud-based service. You need to make sure the proposed vendor can meet the same security requirements as the current solution. What are you currently practicing?
Each correct answer represents a complete solution. Choose all that apply.
GDPR compliance
FISMA compliance
Due diligence
Due care
EGLBA compliance
Answer explanation
You are practicing due diligence and complying with FISMA before migrating some of the internally hosted data to a cloud-based service. Due diligence involves taking a regulated activity or anything else that could lead you into a legal liability. You must investigate the situation you’re entering, understand the risks and obligations it brings, then take reasonable care in your following actions whereas Federal Information Security Management Act (FISMA) is a law applying to all federal agencies. It requires every agency to develop, document, and implement an information security and protection program.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Joe is tuning her organization's firewall rules to prevent IP spoofing. What type of control is Joe implementing?
Technical
Operational
Managerial
Physical
Answer explanation
Technical controls enforce confidentiality, integrity, and availability in the digital space. Technical controls include firewall rules, access control lists, intrusion prevention systems, and encryption. In modern data systems, technical controls do a great amount of work and require the most exacting knowledge. However, they’re still only effective in conjunction with human activities used to implement and enforce them.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following controls primarily protect data availability?
Hashing
Patch management
Digital signatures
Version control
Answer explanation
It’s costly when your organization’s data and other resources aren’t available to those who need it, when they need it. Apart from any other harm done by a security incident, the more it disrupts your business operations, the more harm it will do. Many attacks are designed to damage solely by targeting availability. Availability is typically described in the percentage of the time a system or resource is expected to be operating and responsive. There are many security controls used to enhance availability during routine operations and during or after attacks or system errors.
> Redundancy
> Fault tolerance
> Patch management
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following statements is not true about compensating controls under PCI DSS?
Use and regularly update antivirus software or programs.
Do not use vendor-supplied defaults for system passwords and other security parameters.
Allow physical access to cardholder data.
Encrypt transmission of cardholder data across open public networks.
Answer explanation
For a typical example of regulatory compliance, PCI DSS defines twelve mandated controls needed to meet them.
> Install and maintain a firewall configuration to protect cardholder data.
> Do not use vendor-supplied defaults for system passwords and other security parameters.
> Protect stored cardholder data.
> Encrypt transmission of cardholder data across open, public networks.
> Use and regularly update antivirus software or programs.
> Develop and maintain secure systems and applications.
> Restrict access to cardholder data by business need to know.
> Assign a unique ID to each person with computer access.
> Restrict physical access to cardholder data.
> Track and monitor all access to network resources and cardholder data.
> Regularly test security systems and processes.
> Maintain a policy that addresses information security for all personnel.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A new privacy law demands more robust protection for your customer database. First, you researched database security products to find which would reliably meet your needs. Now that you’ve selected and installed one, you’re currently training administrators to perform integrity checks, update the software, and review logs for suspicious activities. What are you practicing?
Availability
Negligence
Regulatory compliance
Due care
Answer explanation
Due care is less about the research you put in ahead of time and more about the ongoing actions you perform for whatever assets you’re responsible for. For example, maintaining the safety standards of your property over time or making reasonable business decisions for a company you manage for others are examples of due care. If something goes wrong anyway, due care allows you to establish that you worked in good faith to protect the company and its assets from harm.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A third-party team is going to formally examine your organization’s overall security practices to make sure they meet regulatory compliance goals. Your organization may be fined if it fails. What would this verification process be called?
Evaluation
Certification
Audit
Assessment
Answer explanation
The audit is a systematic evaluation of effectiveness against a set of established criteria, such as to verify regulatory compliance or cost-effectiveness. Audits are intended to provide independent proof of performance to parties such as upper management, investors, external partners, and regulatory bodies. They tend to be formal and follow strictly designed criteria, and there can be severe consequences for production systems failing an audit. Depending on the audience of an audit, it might be performed by an independent internal team, or by an external contractor.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
10 questions
IT General Control
Quiz
•
Professional Development
15 questions
Sec+ CH.1 Review Test
Quiz
•
Professional Development
15 questions
Ipad
Quiz
•
1st Grade - Professio...
10 questions
C++ quiz
Quiz
•
10th Grade - Professi...
10 questions
Zoom Video Conference
Quiz
•
Professional Development
11 questions
Types of Mass Media
Quiz
•
10th Grade - Professi...
12 questions
React/Javascript Quizz
Quiz
•
Professional Development
15 questions
Cloud Computing_2
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
