
Sec+2
Authored by Marco Lopez
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A tech company, InnovateTech, has recently faced multiple incidents of unauthorized personnel trying to access their R&D labs. They wish to monitor and record all activities near the entrance of this sensitive area. Which physical security measure would be most effective for this requirement?
RFID Badge Readers
Biometric Scanners
Video Surveillance Cameras
Mantrap
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cybersecurity analyst at XYZ Corp is looking to deploy a system that appears to be vulnerable and enticing to attackers. The main goal is to study the tactics, techniques, and procedures (TTPs) of potential adversaries, without them realizing that they’re interacting with a decoy. Which of the following would BEST meet this requirement?
Intrusion Detection System (IDS)
Firewall
Honeypot
VPN Concentrator
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A multinational organization recently experienced a significant security breach. After investigating, it was determined that a change to the network infrastructure was made without undergoing the standard approval process. As a result, there was a misconfiguration which allowed unauthorized access. What security principle related to change management did the organization neglect?
Configuration baseline reviews
Least privilege enforcement
Approval process adherence
Patch management
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After a series of cyber-attacks on a company’s infrastructure, the IT team decided to deploy a solution that would seem like a legitimate part of their network but is intentionally isolated and monitored. They intend to detect and analyze malicious activities in this isolated environment. What technology are they most likely implementing?
Network segmentation
Honeypot
DMZ (Demilitarized Zone)
Sandboxing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Liam, the CTO of a medium-sized enterprise, noticed that several software applications were not updated regularly, leading to potential security vulnerabilities. Upon investigation, he realized that no specific team or individual was assigned as the owner of these applications. To enhance security, what should Liam emphasize?
Immediate decommissioning of all unowned applications
Assignment of clear ownership to all business applications
Conducting monthly vulnerability assessments on all applications
Outsourcing the management of these applications to third-party vendors
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
TechSoft Corp, a mid-sized software development firm, is relocating its main office to a new building. The management is concerned about potential threats after hours, particularly due to the increasing reports of cyber-espionage. They are evaluating different security measures. Which option would provide an immediate physical presence and deterrence during non-business hours?
CCTV with motion detection
Retinal scan at all entrances
Security guard presence
Reinforced doors and windows
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alice, a system administrator for a startup, is preparing to deploy a new website for her company. To ensure secure communications between the users and the website, she plans to obtain a digital certificate for the site. Before doing so, which step must Alice first undertake to get a certificate from a Certificate Authority (CA)?
Generate a public-private key pair
Submit her passport copy to the CA
Download the latest CA root certificate
Encrypt the website with symmetric encryption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?