CC exam V3

CC exam V3

University

100 Qs

quiz-placeholder

Similar activities

Pertandingan PAL Online

Pertandingan PAL Online

University

100 Qs

Computer Architecture Year 7 EOU Test

Computer Architecture Year 7 EOU Test

6th Grade - University

100 Qs

Fundamentals of IT Revision

Fundamentals of IT Revision

University

100 Qs

MIS MBA 2nd sem

MIS MBA 2nd sem

University

100 Qs

CCNA 1 Chapters 1-3

CCNA 1 Chapters 1-3

University

95 Qs

CC4 MOCK TEST

CC4 MOCK TEST

University

104 Qs

computer  hardware part1

computer hardware part1

10th Grade - University

100 Qs

Collection Lect 2-10 _ COA MCQ T3 2023

Collection Lect 2-10 _ COA MCQ T3 2023

University

100 Qs

CC exam V3

CC exam V3

Assessment

Quiz

Computers

University

Hard

Created by

Yuri Bullcatsz

FREE Resource

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following is an example of an information asset registry?

A list of all the suppliers and vendors used by an organization

A database of all the financial transactions of an organization

A list of all the employees in an organization and their roles

A list of all the hardware and software assets in an organization

2.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following is an important consideration when implementing system hardening measures?

System hardening measures should be tested and evaluated to ensure that they are effective.

Password policies should be relaxed to make it easier for users to access the system.

System performance should always be prioritized over security.

All security measures should be disabled when performing software updates.

3.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

How can security awareness training be integrated into everyday work activities?

By hosting regular in-person seminars or workshops

By requiring employees to complete a training course before accessing company resources

By providing employees with security-related tasks to complete as part of their job responsibilities

By providing ongoing reminders and updates about security best practices through email or messaging systems

4.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following is an example of system hardening?

Allowing all incoming traffic through a firewall.

Disabling unnecessary services and ports on a server.

Allowing users to connect to a network without a password.

Enabling all user accounts with administrative privileges.

5.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the difference between a log and an event?

A log is a record of events, while an event is a specific occurrence

A log is a record of security-related events, while an event is a record of all types of events

A log and an event are the same thing

A log is a specific occurrence, while an event is a record of events

6.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What are some best practices for data retention?

Deleting all data as soon as it is no longer needed, regardless of legal or business requirements.

None

Storing all data indefinitely, regardless of its importance or sensitivity.

Regularly reviewing and updating data retention policies to ensure compliance with regulatory requirements.

7.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What are some examples of storage devices where data remanence can occur?

Hard disk drives

USB flash drives

Solid-state drives

All options

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?