SEXXC ++

SEXXC ++

University

17 Qs

quiz-placeholder

Similar activities

Questionario sobre certificações

Questionario sobre certificações

University

12 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Cloud computing Test

Cloud computing Test

University

20 Qs

Security Plus CompTIA

Security Plus CompTIA

University - Professional Development

20 Qs

BAB 11

BAB 11

University

20 Qs

Cloud Architecting - Week 5

Cloud Architecting - Week 5

University

20 Qs

Computer Security Measure

Computer Security Measure

11th Grade - University

19 Qs

J277 - 1.4 - Network Threats

J277 - 1.4 - Network Threats

10th Grade - University

16 Qs

 SEXXC ++

SEXXC ++

Assessment

Quiz

Computers

University

Hard

Created by

Azarya Pmosby

Used 5+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is outlining data stewardship roles and responsibilities. Which

of the following employee roles would determine the purpose of data and

how to process it?

Data custodian

Data protection officer

Data controller

Data processor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is assessing a new y developed web application by testing

SQL injection, CSRF, and XML injection. Which of the following frameworks should the analyst consider?

ISO

OWASP

MITRE ATT&CK

NIST

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company has a flat network that is deployed in the cloud. Security policy states that all production and development servers must be segmented. Which of the following should be used to design the network to meet the security requirements?

CASB

VPC

Perimeter network

WAF

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security implication of newer ICS devices that are becoming more common in corporations?

Devices with cellular communication capabilities bypass traditional network security controls

Many devices do not support elliptic-curve encryption algorithms due to the overhead they require

These devices often lack privacy controls and do not meet newer compliance regulations

Unauthorized voice and audio recording can cause loss of intellectual property

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network architect wants a server to have the ability to retain network availability even if one of the network switches it is connected to goes down.

Which of the following should the architect implement on the server to achieve this goal?

RAID

UPS

Load balancing

NIC teaming

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security analysts have noticed the network becomes flooded with malicious packets at specific times of the day. Which of the following should the analysts use to investigate this issue?

Bandwidth monitors

Web metadata

System files

Correlation dashboards

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization's Chief Information Security Officer is creating a position that will be responsible for implementing technical controls to protect data, including ensuring backups are properly maintained. Which of the following roles would MOST likely include these responsibilities?

Data protection officer

Data owner

Backup administrator

Data custodian

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?