Module 1 - General Security Concepts

Module 1 - General Security Concepts

University

31 Qs

quiz-placeholder

Similar activities

Final Exam - Audit Sistem Informasi 2022

Final Exam - Audit Sistem Informasi 2022

University

26 Qs

Adversarial Search and CSP Quiz

Adversarial Search and CSP Quiz

University

26 Qs

IEEE Coding Cybersecurity

IEEE Coding Cybersecurity

University

27 Qs

Tin học 8-Ôn tập giữa kì 2

Tin học 8-Ôn tập giữa kì 2

9th Grade - University

28 Qs

2.6 Adapter Cards

2.6 Adapter Cards

12th Grade - University

30 Qs

2 Azul Bloques

2 Azul Bloques

1st Grade - University

28 Qs

Hardwares - Principais Componentes

Hardwares - Principais Componentes

3rd Grade - University

28 Qs

6.0 SDLC

6.0 SDLC

University

30 Qs

Module 1 - General Security Concepts

Module 1 - General Security Concepts

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Sebastian Zamorano

Used 13+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used to add extra complexity before using a one-way data transformation algorithm?

Key stretching
Data masking
Steganography
Salting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?

Compensating control
Network segmentation
Transfer of risk
SNMP traps

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security concepts is the best reason for permissions on a human resources fileshare to follow the principle of least privilege?

Integrity
Availability
Confidentiality
Non-repudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?

Corrective
Preventive
Detective
Deterrent

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users' passwords. Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?

Multifactor authentication
Permissions assignment
Access management
Password complexity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

Secured zones
Subject role
Adaptive identity
Threat scope reduction

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator would like to protect data on employees' laptops. Which of the following encryption techniques should the security administrator use?

Partition
Asymmetric
Full disk
Database

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers