
Choloe
Authored by Vernice Gaylor
Other
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
101 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the PRIMARY purpose of installing a mantrap within a facility?
Control traffic
Prevent rapid movement
|Prevent piggybacking
Control air flow
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of the following controls in place?
Whitelisting application
Network segmentation
Hardened configuration
Blacklisting application
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?
File Integrity Checker
Security information and event management (SIEM) system
Audit Logs
Intrusion detection system (IDS)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization with divisions in the United States (US) and the United Kingdom (UK) processes data comprised of personal information belonging to subjects living in the
European Union (EU) and in the US. Which data MUST be handled according to the privacy protections of General Data Protection Regulation (GDPR)?
Only the EU citizens’ data
Only the EU residents’ data
Only the UK citizens' data
Only data processed in the UK
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following has the responsibility of information technology (IT) governance?
Chief Information Officer (CIO)
Senior IT Management
Board of Directors
Chief Information Security Officer (CISO)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Dumpster diving is a technique used in which stage of penetration testing methodology?
Attack
Discovery
Reporting
Planning
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the MOST common cause of Remote Desktop Protocol (RDP) compromise?
Brute force attack
POrt Scan
Remote Exploit
Social Engineering
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?