
SEXXC ++
Authored by Azarya Pmosby
Computers
University
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization is outlining data stewardship roles and responsibilities. Which
of the following employee roles would determine the purpose of data and
how to process it?
Data custodian
Data protection officer
Data controller
Data processor
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst is assessing a new y developed web application by testing
SQL injection, CSRF, and XML injection. Which of the following frameworks should the analyst consider?
ISO
OWASP
MITRE ATT&CK
NIST
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company has a flat network that is deployed in the cloud. Security policy states that all production and development servers must be segmented. Which of the following should be used to design the network to meet the security requirements?
CASB
VPC
Perimeter network
WAF
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a security implication of newer ICS devices that are becoming more common in corporations?
Devices with cellular communication capabilities bypass traditional network security controls
Many devices do not support elliptic-curve encryption algorithms due to the overhead they require
These devices often lack privacy controls and do not meet newer compliance regulations
Unauthorized voice and audio recording can cause loss of intellectual property
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network architect wants a server to have the ability to retain network availability even if one of the network switches it is connected to goes down.
Which of the following should the architect implement on the server to achieve this goal?
RAID
UPS
Load balancing
NIC teaming
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Security analysts have noticed the network becomes flooded with malicious packets at specific times of the day. Which of the following should the analysts use to investigate this issue?
Bandwidth monitors
Web metadata
System files
Correlation dashboards
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization's Chief Information Security Officer is creating a position that will be responsible for implementing technical controls to protect data, including ensuring backups are properly maintained. Which of the following roles would MOST likely include these responsibilities?
Data protection officer
Data owner
Backup administrator
Data custodian
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
13 questions
Chap 1: What is a program made of?
Quiz
•
University
20 questions
Berpikir Komputasi - Assessment 1
Quiz
•
University
20 questions
Banco de Dados
Quiz
•
University - Professi...
14 questions
LA7.C7: Turtle Graphics
Quiz
•
9th Grade - University
15 questions
ARKOM 2_INS
Quiz
•
University
20 questions
C - Structures
Quiz
•
University
20 questions
DreamWeaver CS6
Quiz
•
University
12 questions
ASK Tingkatan 1: 2.2.2 Format Imej pada Fail yang Sama
Quiz
•
12th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade