
Security+ Lesson1
Authored by Alejandro Hidalgo
Computers
Professional Development
Used 27+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company is developing an application in which a private US-based hospital will allow patients to access their medical records online. Regardless of what other data the application handles, what kind of compliance do you already know you need to research?
FISMA
FERPA
PCI DSS
HIPAA
Answer explanation
You need to research Health Insurance Portability and Accountability Act (HIPAA) compliance as it is a federal law designed to protect the health insurance coverage of workers who change or lose their jobs. The important part from an IT perspective is how it protects the privacy of patient records. HIPAA defines protected health information (PHI) and regulates how it can be used or disclosed. It also defines security standards for the storage and access of PHI.
2.
MULTIPLE SELECT QUESTION
1 min • 2 pts
The US government agency plans to migrate some of its internally hosted data to a cloud-based service. You need to make sure the proposed vendor can meet the same security requirements as the current solution. What are you currently practicing?
Each correct answer represents a complete solution. Choose all that apply.
GDPR compliance
FISMA compliance
Due diligence
Due care
EGLBA compliance
Answer explanation
You are practicing due diligence and complying with FISMA before migrating some of the internally hosted data to a cloud-based service. Due diligence involves taking a regulated activity or anything else that could lead you into a legal liability. You must investigate the situation you’re entering, understand the risks and obligations it brings, then take reasonable care in your following actions whereas Federal Information Security Management Act (FISMA) is a law applying to all federal agencies. It requires every agency to develop, document, and implement an information security and protection program.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Joe is tuning her organization's firewall rules to prevent IP spoofing. What type of control is Joe implementing?
Technical
Operational
Managerial
Physical
Answer explanation
Technical controls enforce confidentiality, integrity, and availability in the digital space. Technical controls include firewall rules, access control lists, intrusion prevention systems, and encryption. In modern data systems, technical controls do a great amount of work and require the most exacting knowledge. However, they’re still only effective in conjunction with human activities used to implement and enforce them.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following controls primarily protect data availability?
Hashing
Patch management
Digital signatures
Version control
Answer explanation
It’s costly when your organization’s data and other resources aren’t available to those who need it, when they need it. Apart from any other harm done by a security incident, the more it disrupts your business operations, the more harm it will do. Many attacks are designed to damage solely by targeting availability. Availability is typically described in the percentage of the time a system or resource is expected to be operating and responsive. There are many security controls used to enhance availability during routine operations and during or after attacks or system errors.
> Redundancy
> Fault tolerance
> Patch management
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following statements is not true about compensating controls under PCI DSS?
Use and regularly update antivirus software or programs.
Do not use vendor-supplied defaults for system passwords and other security parameters.
Allow physical access to cardholder data.
Encrypt transmission of cardholder data across open public networks.
Answer explanation
For a typical example of regulatory compliance, PCI DSS defines twelve mandated controls needed to meet them.
> Install and maintain a firewall configuration to protect cardholder data.
> Do not use vendor-supplied defaults for system passwords and other security parameters.
> Protect stored cardholder data.
> Encrypt transmission of cardholder data across open, public networks.
> Use and regularly update antivirus software or programs.
> Develop and maintain secure systems and applications.
> Restrict access to cardholder data by business need to know.
> Assign a unique ID to each person with computer access.
> Restrict physical access to cardholder data.
> Track and monitor all access to network resources and cardholder data.
> Regularly test security systems and processes.
> Maintain a policy that addresses information security for all personnel.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A new privacy law demands more robust protection for your customer database. First, you researched database security products to find which would reliably meet your needs. Now that you’ve selected and installed one, you’re currently training administrators to perform integrity checks, update the software, and review logs for suspicious activities. What are you practicing?
Availability
Negligence
Regulatory compliance
Due care
Answer explanation
Due care is less about the research you put in ahead of time and more about the ongoing actions you perform for whatever assets you’re responsible for. For example, maintaining the safety standards of your property over time or making reasonable business decisions for a company you manage for others are examples of due care. If something goes wrong anyway, due care allows you to establish that you worked in good faith to protect the company and its assets from harm.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A third-party team is going to formally examine your organization’s overall security practices to make sure they meet regulatory compliance goals. Your organization may be fined if it fails. What would this verification process be called?
Evaluation
Certification
Audit
Assessment
Answer explanation
The audit is a systematic evaluation of effectiveness against a set of established criteria, such as to verify regulatory compliance or cost-effectiveness. Audits are intended to provide independent proof of performance to parties such as upper management, investors, external partners, and regulatory bodies. They tend to be formal and follow strictly designed criteria, and there can be severe consequences for production systems failing an audit. Depending on the audience of an audit, it might be performed by an independent internal team, or by an external contractor.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
CodeMonkey Platform Management & Resources
Quiz
•
Professional Development
10 questions
Y9 App Lab Assessment
Quiz
•
Professional Development
10 questions
Physical Security Controls
Quiz
•
Professional Development
10 questions
Impact of Implementing Data in Organisations
Quiz
•
Professional Development
15 questions
Computer basics for beginners
Quiz
•
Professional Development
10 questions
GUESS THAT WORD IN CYBER!
Quiz
•
Professional Development
10 questions
Let's Play Together
Quiz
•
University - Professi...
15 questions
Sec+ CH.2 Review Test
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...