Security+ SY0-701

Security+ SY0-701

University

20 Qs

quiz-placeholder

Similar activities

The AI Shield

The AI Shield

University

15 Qs

DI (EM24) - Diseño de Perfiles (T5)

DI (EM24) - Diseño de Perfiles (T5)

University - Professional Development

20 Qs

Data Mining - Classification Mining

Data Mining - Classification Mining

University

15 Qs

Unit 28 - Quiz #1

Unit 28 - Quiz #1

University

15 Qs

PROBLEM SOLVING USING R  UNIT I  MCQS

PROBLEM SOLVING USING R UNIT I MCQS

University

15 Qs

Quiz on List and Tuples

Quiz on List and Tuples

University

16 Qs

Data Structure & Algo - Prelim Long Quiz

Data Structure & Algo - Prelim Long Quiz

University

21 Qs

Introduction to Networking

Introduction to Networking

University

15 Qs

Security+ SY0-701

Security+ SY0-701

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Marco Lopez

Used 31+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A client disputes having signed a digital contract. The service provider needs to prove that the signature was indeed from the client and hasn’t been tampered with. Which of the following security concepts is the service provider relying on?

Authentication

Confidentiality

Non-repudiation

Access Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Carlos, an IT consultant, advises a startup company on cybersecurity best practices. The company plans to launch several microsites under various subdomains. They want a solution that is cost-effective but also ensures that the sites are validated by a third-party. What type of certificate should Carlos recommend?

A separate self-signed certificate for each microsite

An individual third-party certificate for each subdomain

A third-party wildcard certificate

An EV certificate issued by an internal CA

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to ensure that security incidents are detected and addressed as quickly as possible by on-duty personnel. Which of the following operational security controls would be BEST to implement for this purpose?

Deploying a Network Intrusion Prevention System (NIPS)

Establishing a 24/7 Security Operations Center (SOC)

Creating a company-wide security policy

Implementing end-to-end data encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a routine check, the IT department discovered that several employees had left their computers on and unattended during lunch break. Which operational security control can help mitigate the risk associated with this behavior?

Implementing biometric authentication

Enforcing a strict password policy

Deploying an automatic screen lock after inactivity

Implementing a secure coding practice

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An art gallery wants to deploy a security solution to detect movement in an open courtyard that features several sculptures. This space has varying temperature conditions, which might cause false alarms in some motion detection technologies. Which type of sensor would be MOST appropriate to ensure consistent motion detection in such conditions?

Thermal imaging sensors

Pressure-sensitive mats

Ultrasonic detectors

Microwave motion detectors

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company’s primary security control for accessing secure server rooms is a biometric fingerprint scanner. However, the scanner occasionally malfunctions in high humidity. The security team is considering an alternative solution to grant access when the primary method fails. Which of the following would be the MOST appropriate compensating control?

Implementing a security token-based authentication system

Employing security guards at the main entrance

Installing security cameras inside the server room

Conducting regular server room audits

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A financial institution wants to ensure that customers are aware of the bank’s policies on information sharing and how their personal data is used. Which of the following security controls would BEST communicate this to customers?

Implementing end-to-end encryption for online transactions

Publishing a privacy policy on the bank's website

Conducting annual cybersecurity awareness training for employees

Using multi-factor authentication for online banking

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?