Search Header Logo

Chapter 10 casp

Authored by Timothy Courson

Professional Development

Professional Development

Used 3+ times

Chapter 10 casp
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a network defender and finding it difficult to keep up with the volume of network attacks. What can you leverage to help with early detection and response to these threats, especially new ones?

Machine learning

SIEM

DevSecOps

Security as code

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company wants to begin using biometrics for authentication. Which of the following are not biometrics that can be verified by a system to give an individual access?

Facial recognition

Iris recognition

Retina recognition

PIN recognition

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The rise of Internet of things has presented challenges for your organization security team while trying to secure your corporate network. Attacks on IO T have been steadily trending upward as attackers enlist devices to launch attacks. But it's the best method to combat this threat?

Adding network intrusion devices

Preforming inventory managment

Adding more security tools

Reducing the attack surface

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Terry is heading a project to implement a chat box on the home page of your insurance company to move away from live agents. what technology will most likely employee?

Natural language processing

Biometrics

Virtual reality

Deep Fake

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Felipe wants to use a protocol that allows a client to retrieve an element of database without the owner of that database knowing which element was selected. If implemented security, the client will only learn about the element they are querying for and nothing else, preserving privacy. Which of the following provides the best solution?

Strong private information retrieval

Secure function evaluation

Private function evaluation

Big data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Augmented reality (A r ) advances are exciting , and cyber security is now dealing with a vast amount of complexity. The adoption of AR brings an expanding landscape of new cyber security vulnerabilities. Consumers and businesses are grappling with big data breaches and implementing effective cyber security measures is essential for modern businesses. Which of these is not an urgent or relevant cybersecurity issue involving AR?

Cloud structure

Innovation outpacing secure development

Wearable exposure

Micro/nano technology

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3D printers include computers and run software that should be vulnerable to security issues that bad actors can take advantage of period to mitigate this issue, 3D printing vendors Need to make sure coding and design a core part of their development process. Printer owners should also consider doing which of these first?

Securely downloading plans for 3D printers

Hardening their devices when possible and considering the security of the 3D production

Encrypting SD cards used to hold all printing plans

Cleaning the laser that melts the powdered material into objects layer by layer

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?