Search Header Logo

Security+ Fundamentals of INFOSEC

Authored by Patrick Hines

Computers

Professional Development

Used 2+ times

Security+ Fundamentals of INFOSEC
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a physical security control?

Encryption
Antivirus software
Firewall
Intrusion Detection System
CCTV surveillance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of authentication in information security?

Ensuring availability
Ensuring accountability
Ensuring confidentiality
Ensuring identification
Ensuring integrity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an Intrusion Detection System (IDS) in information security?

To prevent unauthorized access
To authenticate users
To encrypt sensitive data
To enforce security policies
To monitor network traffic for suspicious activity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a firewall in information security?

To securely store digital certificates
To encrypt network traffic
To prevent unauthorized access to a computer network
To monitor network traffic for suspicious activity
To detect and remove computer viruses

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a technical security control?

Background checks for employees
Incident response plan
Security awareness training
Security policies and procedures
Biometric authentication

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is the purpose of data encryption in information security?(Choose all that apply)

To ensure the confidentiality of data

To monitor network traffic for suspicious activity
To prevent unauthorized access to data
To authenticate users

To ensure the integrity of data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a Virtual Private Network (VPN) in information security?

To monitor network traffic for suspicious activity
To prevent unauthorized access to a computer network
To enforce security policies
To encrypt network traffic
To authenticate users

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?