Search Header Logo

Sec+2

Authored by Marco Lopez

Computers

University

Sec+2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A tech company, InnovateTech, has recently faced multiple incidents of unauthorized personnel trying to access their R&D labs. They wish to monitor and record all activities near the entrance of this sensitive area. Which physical security measure would be most effective for this requirement?

RFID Badge Readers

Biometric Scanners

Video Surveillance Cameras

Mantrap

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybersecurity analyst at XYZ Corp is looking to deploy a system that appears to be vulnerable and enticing to attackers. The main goal is to study the tactics, techniques, and procedures (TTPs) of potential adversaries, without them realizing that they’re interacting with a decoy. Which of the following would BEST meet this requirement?

Intrusion Detection System (IDS)

Firewall

Honeypot

VPN Concentrator

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A multinational organization recently experienced a significant security breach. After investigating, it was determined that a change to the network infrastructure was made without undergoing the standard approval process. As a result, there was a misconfiguration which allowed unauthorized access. What security principle related to change management did the organization neglect?

Configuration baseline reviews

Least privilege enforcement

Approval process adherence

Patch management

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a series of cyber-attacks on a company’s infrastructure, the IT team decided to deploy a solution that would seem like a legitimate part of their network but is intentionally isolated and monitored. They intend to detect and analyze malicious activities in this isolated environment. What technology are they most likely implementing?

Network segmentation

Honeypot

DMZ (Demilitarized Zone)

Sandboxing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Liam, the CTO of a medium-sized enterprise, noticed that several software applications were not updated regularly, leading to potential security vulnerabilities. Upon investigation, he realized that no specific team or individual was assigned as the owner of these applications. To enhance security, what should Liam emphasize?

Immediate decommissioning of all unowned applications

Assignment of clear ownership to all business applications

Conducting monthly vulnerability assessments on all applications

Outsourcing the management of these applications to third-party vendors

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TechSoft Corp, a mid-sized software development firm, is relocating its main office to a new building. The management is concerned about potential threats after hours, particularly due to the increasing reports of cyber-espionage. They are evaluating different security measures. Which option would provide an immediate physical presence and deterrence during non-business hours?

CCTV with motion detection

Retinal scan at all entrances

Security guard presence

Reinforced doors and windows

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice, a system administrator for a startup, is preparing to deploy a new website for her company. To ensure secure communications between the users and the website, she plans to obtain a digital certificate for the site. Before doing so, which step must Alice first undertake to get a certificate from a Certificate Authority (CA)?

Generate a public-private key pair

Submit her passport copy to the CA

Download the latest CA root certificate

Encrypt the website with symmetric encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?