Sec Review 1

Sec Review 1

University

10 Qs

quiz-placeholder

Similar activities

Risk Management

Risk Management

University

9 Qs

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

e-commerce security TRUE/FALSE Quiz

e-commerce security TRUE/FALSE Quiz

University - Professional Development

10 Qs

Pembekalan Teknis UNBK

Pembekalan Teknis UNBK

University

8 Qs

Teknik Penyerangan - Scanning

Teknik Penyerangan - Scanning

University

15 Qs

Network Security Fundamentals

Network Security Fundamentals

University

8 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

University

15 Qs

Sec Review 1

Sec Review 1

Assessment

Quiz

Computers

University

Easy

Created by

Tony Diaz

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following is considered a managerial control?

Encryption

Firewall

Security Policy

Video Surveillance

2.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What is the primary purpose of a maintenance window in the change management process?

To schedule a specific time frame for performing maintenance or changes to the IT systems.

To document the approval process of the change.

To analyze the impact of the change on the organization.

To define the steps to revert to the original state if the change is unsuccessful.

3.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

A threat actor who is motivated by philosophical or political beliefs is typically known as a:

Unskilled attacker

Insider threat

Nation-state

Hacktivist

4.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

To prevent unauthorized devices from accessing certain parts of the network, an administrator should implement:

Segmentation

Decommissioning

Patching

Monitoring

5.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What is the primary advantage of Infrastructure as Code (IaC)?

It provides a real-time operating system.

Ease of deployment and scalability.

It reduces the cost of physical infrastructure.

It replaces the need for cloud solutions.

6.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following is considered non-human-readable data?

Printed financial reports

Encrypted email message

Organizational policy in PDF format

Bar graph depicting quarterly profits

7.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

After patching a system to address a known vulnerability, what should be done next to ensure the vulnerability has been resolved?

Enumeration.

Prioritize other vulnerabilities.

Activate compensating controls.

Validation of remediation.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?