
Choloe
Authored by Vernice Gaylor
Other
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
101 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the PRIMARY purpose of installing a mantrap within a facility?
Control traffic
Prevent rapid movement
|Prevent piggybacking
Control air flow
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of the following controls in place?
Whitelisting application
Network segmentation
Hardened configuration
Blacklisting application
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?
File Integrity Checker
Security information and event management (SIEM) system
Audit Logs
Intrusion detection system (IDS)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization with divisions in the United States (US) and the United Kingdom (UK) processes data comprised of personal information belonging to subjects living in the
European Union (EU) and in the US. Which data MUST be handled according to the privacy protections of General Data Protection Regulation (GDPR)?
Only the EU citizens’ data
Only the EU residents’ data
Only the UK citizens' data
Only data processed in the UK
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following has the responsibility of information technology (IT) governance?
Chief Information Officer (CIO)
Senior IT Management
Board of Directors
Chief Information Security Officer (CISO)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Dumpster diving is a technique used in which stage of penetration testing methodology?
Attack
Discovery
Reporting
Planning
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the MOST common cause of Remote Desktop Protocol (RDP) compromise?
Brute force attack
POrt Scan
Remote Exploit
Social Engineering
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
100 questions
Personal Finance Final Exam
Quiz
•
12th Grade - University
100 questions
Government
Quiz
•
9th - 12th Grade
100 questions
x quiz by Duong Do Nhat
Quiz
•
1st Grade - Professio...
100 questions
Маркетинговый анализ
Quiz
•
12th Grade
100 questions
9-12 Quiz (Sept. 8-11)
Quiz
•
12th Grade
99 questions
Rabbit Quiz 1
Quiz
•
12th Grade
98 questions
Customer Service Quiz
Quiz
•
12th Grade
101 questions
Ultimate Logo Quiz
Quiz
•
4th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Other
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
15 questions
Making Inferences
Quiz
•
7th - 12th Grade
12 questions
Add and Subtract Polynomials
Quiz
•
9th - 12th Grade
7 questions
How James Brown Invented Funk
Interactive video
•
10th Grade - University
15 questions
Atomic Habits: Career Habits
Lesson
•
9th - 12th Grade
20 questions
Banking
Quiz
•
9th - 12th Grade
15 questions
Exponential Growth and Decay Word Problems Practice
Quiz
•
9th - 12th Grade
18 questions
AP Bio Insta-Review Topic 6.1*: DNA & RNA Structure
Quiz
•
9th - 12th Grade