CC exam V3

CC exam V3

University

100 Qs

quiz-placeholder

Similar activities

Principles of Programming Languages

Principles of Programming Languages

University

100 Qs

ICT practica ENU

ICT practica ENU

University

101 Qs

AlgoritmUwUsok és adatszerkezetek I. Vizsga

AlgoritmUwUsok és adatszerkezetek I. Vizsga

University

96 Qs

OOP Final Exam

OOP Final Exam

University

100 Qs

Kuis [3/4] Inheritance hingga Polymorphism

Kuis [3/4] Inheritance hingga Polymorphism

University

100 Qs

Python Basics

Python Basics

University

100 Qs

Python List

Python List

8th Grade - University

100 Qs

CG Test unit 2

CG Test unit 2

University

97 Qs

CC exam V3

CC exam V3

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Yuri Bullcatsz

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following is an example of an information asset registry?

A list of all the suppliers and vendors used by an organization

A database of all the financial transactions of an organization

A list of all the employees in an organization and their roles

A list of all the hardware and software assets in an organization

2.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following is an important consideration when implementing system hardening measures?

System hardening measures should be tested and evaluated to ensure that they are effective.

Password policies should be relaxed to make it easier for users to access the system.

System performance should always be prioritized over security.

All security measures should be disabled when performing software updates.

3.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

How can security awareness training be integrated into everyday work activities?

By hosting regular in-person seminars or workshops

By requiring employees to complete a training course before accessing company resources

By providing employees with security-related tasks to complete as part of their job responsibilities

By providing ongoing reminders and updates about security best practices through email or messaging systems

4.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following is an example of system hardening?

Allowing all incoming traffic through a firewall.

Disabling unnecessary services and ports on a server.

Allowing users to connect to a network without a password.

Enabling all user accounts with administrative privileges.

5.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the difference between a log and an event?

A log is a record of events, while an event is a specific occurrence

A log is a record of security-related events, while an event is a record of all types of events

A log and an event are the same thing

A log is a specific occurrence, while an event is a record of events

6.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What are some best practices for data retention?

Deleting all data as soon as it is no longer needed, regardless of legal or business requirements.

None

Storing all data indefinitely, regardless of its importance or sensitivity.

Regularly reviewing and updating data retention policies to ensure compliance with regulatory requirements.

7.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What are some examples of storage devices where data remanence can occur?

Hard disk drives

USB flash drives

Solid-state drives

All options

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers