
Choloe
Authored by Vernice Gaylor
Other
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
101 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the PRIMARY purpose of installing a mantrap within a facility?
Control traffic
Prevent rapid movement
|Prevent piggybacking
Control air flow
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of the following controls in place?
Whitelisting application
Network segmentation
Hardened configuration
Blacklisting application
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?
File Integrity Checker
Security information and event management (SIEM) system
Audit Logs
Intrusion detection system (IDS)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization with divisions in the United States (US) and the United Kingdom (UK) processes data comprised of personal information belonging to subjects living in the
European Union (EU) and in the US. Which data MUST be handled according to the privacy protections of General Data Protection Regulation (GDPR)?
Only the EU citizens’ data
Only the EU residents’ data
Only the UK citizens' data
Only data processed in the UK
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following has the responsibility of information technology (IT) governance?
Chief Information Officer (CIO)
Senior IT Management
Board of Directors
Chief Information Security Officer (CISO)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Dumpster diving is a technique used in which stage of penetration testing methodology?
Attack
Discovery
Reporting
Planning
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the MOST common cause of Remote Desktop Protocol (RDP) compromise?
Brute force attack
POrt Scan
Remote Exploit
Social Engineering
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
103 questions
Millim Lists 1-10
Quiz
•
12th Grade
100 questions
Milady State Board Review #1
Quiz
•
12th Grade - University
101 questions
NAVAL SCIENCE 2 - 2ND SEM - EOC TEST
Quiz
•
10th - 12th Grade
100 questions
Practical Research II-Quarter 1 -Long Test
Quiz
•
12th Grade
99 questions
WACE U3 Psychology - Memory Quiz
Quiz
•
12th Grade
100 questions
Quis MUK
Quiz
•
9th - 12th Grade
105 questions
Topik II so'zlari 10
Quiz
•
12th Grade
103 questions
NAVAL SCIENCE 3 - 1ST SEM - EOC TEST
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade
Discover more resources for Other
8 questions
2 Step Word Problems
Quiz
•
KG - University
10 questions
Martin Luther King, Jr. For Kids
Interactive video
•
1st - 12th Grade
10 questions
Dr. King's Speech and Its Impact
Interactive video
•
7th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
7 questions
Anti-Bullying ARS 15-341
Quiz
•
9th - 12th Grade
13 questions
Model Exponential Growth and Decay Scenarios
Quiz
•
9th - 12th Grade
15 questions
TSI Math Practice Questions
Quiz
•
8th - 12th Grade
24 questions
Identify Properties of Polygons and Quadrilaterals
Quiz
•
9th - 12th Grade