Search Header Logo

Choloe

Authored by Vernice Gaylor

Other

12th Grade

Used 1+ times

Choloe
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

101 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the PRIMARY purpose of installing a mantrap within a facility?

Control traffic

Prevent rapid movement

|Prevent piggybacking

Control air flow

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of the following controls in place?

Whitelisting application

Network segmentation

Hardened configuration

Blacklisting application

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?

File Integrity Checker

Security information and event management (SIEM) system

Audit Logs

Intrusion detection system (IDS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization with divisions in the United States (US) and the United Kingdom (UK) processes data comprised of personal information belonging to subjects living in the

European Union (EU) and in the US. Which data MUST be handled according to the privacy protections of General Data Protection Regulation (GDPR)?

Only the EU citizens’ data

Only the EU residents’ data

Only the UK citizens' data

Only data processed in the UK

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following has the responsibility of information technology (IT) governance?

Chief Information Officer (CIO)

Senior IT Management

Board of Directors

Chief Information Security Officer (CISO)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dumpster diving is a technique used in which stage of penetration testing methodology?

Attack

Discovery

Reporting

Planning

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the MOST common cause of Remote Desktop Protocol (RDP) compromise?

Brute force attack

POrt Scan

Remote Exploit

Social Engineering

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?