
Security Quiz
Authored by Khairul Imtiyaz
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A security administrator wants to detect a potential forged sender claim in tt-e envelope of an email. Which of thefollowing should the security administrator implement? (Select TWO).
DNSSEC
S/MIME
MX record
SPF
DMARC
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A security manager wants to transition the organization to a zero trust architecture. To meet this requirement, thesecurity manager has instructed administrators to remove trusted zones, role-based access, and one-timeauthentication. Which of the following will need to be implemented to achieve this objective? (Select THREE).
Least privilege
Policy automation
Continuous validation
VPN
PKI
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a cloud environment, the provider offers relief to an organization's teams by sharing in many of the operationalduties. In a shared responsibility model, which of the following responsibilities belongs to the provider in a Paasimplementation?
Application-specific data assets
Application user access management
Application-specific logic and code
Application/platform software
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization is looking to establish more robust security measures by implementing PKI. Which of thefollowing should the security analyst implement when considering mutual authentication?
Perfect forward secrecy on both endpoints
Shared secret for both endpoints
Public keys on both endpoints
A common public key on each endpoint
A common private key on each endpoint
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following BEST describes a common use case for homomorphic encryption?
Processing data on a server after decrypting in order to prevent unauthorized access in transit
Maintaining the confidentiality of data both at rest and in transit to and from a CSP for processing
Transmitting confidential data to a CSP for processing on a large number of resources without revealing information
Storing proprietary data across multiple nodes in a private cloud to prevent access by unauthenticated users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security architect recommends replacing the company's monolithic software application with a containerizedsolution. Historically, secrets have been stored in the application's configuration files. Which of the followingchanges should the security architect make in the new system?
Use a secrets management tool
Save secrets in key escrow
Store the secrets inside the Dockerfiles
Run all Dockerfles in a randomized namespace
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes the system responsible for storing private encryption/decryption files with athird party to ensure these files are stored safely?
Key escrow
TPM
Trust models
Code signing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?