
Chapter 10 casp
Authored by Timothy Courson
Professional Development
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a network defender and finding it difficult to keep up with the volume of network attacks. What can you leverage to help with early detection and response to these threats, especially new ones?
Machine learning
SIEM
DevSecOps
Security as code
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company wants to begin using biometrics for authentication. Which of the following are not biometrics that can be verified by a system to give an individual access?
Facial recognition
Iris recognition
Retina recognition
PIN recognition
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The rise of Internet of things has presented challenges for your organization security team while trying to secure your corporate network. Attacks on IO T have been steadily trending upward as attackers enlist devices to launch attacks. But it's the best method to combat this threat?
Adding network intrusion devices
Preforming inventory managment
Adding more security tools
Reducing the attack surface
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Terry is heading a project to implement a chat box on the home page of your insurance company to move away from live agents. what technology will most likely employee?
Natural language processing
Biometrics
Virtual reality
Deep Fake
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Felipe wants to use a protocol that allows a client to retrieve an element of database without the owner of that database knowing which element was selected. If implemented security, the client will only learn about the element they are querying for and nothing else, preserving privacy. Which of the following provides the best solution?
Strong private information retrieval
Secure function evaluation
Private function evaluation
Big data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Augmented reality (A r ) advances are exciting , and cyber security is now dealing with a vast amount of complexity. The adoption of AR brings an expanding landscape of new cyber security vulnerabilities. Consumers and businesses are grappling with big data breaches and implementing effective cyber security measures is essential for modern businesses. Which of these is not an urgent or relevant cybersecurity issue involving AR?
Cloud structure
Innovation outpacing secure development
Wearable exposure
Micro/nano technology
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
3D printers include computers and run software that should be vulnerable to security issues that bad actors can take advantage of period to mitigate this issue, 3D printing vendors Need to make sure coding and design a core part of their development process. Printer owners should also consider doing which of these first?
Securely downloading plans for 3D printers
Hardening their devices when possible and considering the security of the 3D production
Encrypting SD cards used to hold all printing plans
Cleaning the laser that melts the powdered material into objects layer by layer
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?