
Security + quiz 19
Authored by Matt Hansen
Instructional Technology
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios BEST describes a risk reduction technique?
A security control objective cannot be met through a technical change, so the company purchases insurance and is no longer concerned about losses from data breaches.
A security control objective cannot be met through a technical change, so the company implements a policy to train users on a more secure method of operation.
A security control objective cannot be met through a technical change, so the company changes as method of operation
A security control objective cannot be met through a technical change, so the Chief Information Officer (CIO) decides to sign off on the risk.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?
SED
HSM
DLP
TPM
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An end user reports a computer has been acting slower than normal for a few weeks. During an
investigation, an analyst determines the system is sending the user's email address and a tendigit number to an IP address once a day. The only recent log entry regarding the user's
computer is the following:
Time: 06:32:29 UTC
Event Description: This file meets the ML algorithm's medium-confidence threshold.
Process Blocked: False
File Quarantined: False
Operating System: Windows 10
File Name: \Device\HarddiskVolume4\Users\jdoe\AppData\Local\Microsoft\Windows\INetCache\IE\pdftodcx.msi
Connection Details: 35.242.219.204:80
Which of the following is the MOST likely cause of the issue?
The end user purchased and installed a PUP from a web browser
A bot on the computer is brute forcing passwords against a website
A hacker is attempting to exfiltrate sensitive data
Ransomware is communicating with a command-and-control server.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?
An attacker is sniffing traffic to port 53, and the server is managed using unencrypted usernames and passwords.
An organization is experiencing excessive traffic on port 53 and suspects an attacker is trying to DoS the domain name server.
Malware trying to resolve an unregistered domain name to determine if it is running in an isolated sandbox
Routing tables have been compromised, and an attacker is rerouting traffic to malicious websites
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the cause of the access issues?
False rejection
Cross-over error rate
Efficacy rale
Attestation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial option article in a national newspaper, which may result in new cyberattacks Which of the following would be BEST for the security manager to use in a threat mode?
Hacktivists
White-hat hackers
Script kiddies
Insider threats
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?
Tokenization
Data masking
Normalization
Obfuscation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Kelas X 28 Spreadsheet 2020
Quiz
•
Professional Development
10 questions
Administracion de Proyectos de T.I. primer parcial
Quiz
•
University - Professi...
16 questions
ROBOTICA EDUCATIVA
Quiz
•
Professional Development
17 questions
UNIDAD 7 ARCHIVO,PROTECCIÓN DE DATOS Y FIRMA ELECTRÓNICA
Quiz
•
1st Grade - Professio...
13 questions
Jets
Quiz
•
1st Grade - Professio...
10 questions
Fundamentos Clase 3 - Azure DevOps
Quiz
•
Professional Development
13 questions
¿Cuánto sabes de POLLY POCKET?
Quiz
•
KG - Professional Dev...
16 questions
ChatGPT
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Instructional Technology
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...