Search Header Logo

Security Quiz

Authored by Khairul Imtiyaz

Computers

University

Security Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A security administrator wants to detect a potential forged sender claim in tt-e envelope of an email. Which of thefollowing should the security administrator implement? (Select TWO).

DNSSEC

S/MIME

MX record

SPF

DMARC

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A security manager wants to transition the organization to a zero trust architecture. To meet this requirement, thesecurity manager has instructed administrators to remove trusted zones, role-based access, and one-timeauthentication. Which of the following will need to be implemented to achieve this objective? (Select THREE).

Least privilege

Policy automation

Continuous validation

VPN

PKI

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a cloud environment, the provider offers relief to an organization's teams by sharing in many of the operationalduties. In a shared responsibility model, which of the following responsibilities belongs to the provider in a Paasimplementation?

Application-specific data assets

Application user access management

Application-specific logic and code

Application/platform software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is looking to establish more robust security measures by implementing PKI. Which of thefollowing should the security analyst implement when considering mutual authentication?

Perfect forward secrecy on both endpoints

Shared secret for both endpoints

Public keys on both endpoints

A common public key on each endpoint

A common private key on each endpoint

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST describes a common use case for homomorphic encryption?

Processing data on a server after decrypting in order to prevent unauthorized access in transit

Maintaining the confidentiality of data both at rest and in transit to and from a CSP for processing

Transmitting confidential data to a CSP for processing on a large number of resources without revealing information

Storing proprietary data across multiple nodes in a private cloud to prevent access by unauthenticated users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security architect recommends replacing the company's monolithic software application with a containerizedsolution. Historically, secrets have been stored in the application's configuration files. Which of the followingchanges should the security architect make in the new system?

Use a secrets management tool

Save secrets in key escrow

Store the secrets inside the Dockerfiles

Run all Dockerfles in a randomized namespace

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes the system responsible for storing private encryption/decryption files with athird party to ensure these files are stored safely?

Key escrow

TPM

Trust models

Code signing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?