CASP+: Chapter5(3of3)

CASP+: Chapter5(3of3)

University

28 Qs

quiz-placeholder

Similar activities

Resiliency and Site Security

Resiliency and Site Security

9th Grade - University

25 Qs

AWS_WEEK_3_QUIZ_ON_12-Aug_2025

AWS_WEEK_3_QUIZ_ON_12-Aug_2025

University

26 Qs

IAS Mid-Term Quiz

IAS Mid-Term Quiz

University

30 Qs

IAS 2 Identity and Access Management Q5

IAS 2 Identity and Access Management Q5

University

25 Qs

Section 7: Security (20-23)

Section 7: Security (20-23)

University

31 Qs

WJEC ICT - Chapter 1 - Internal Components

WJEC ICT - Chapter 1 - Internal Components

10th Grade - University

24 Qs

Arkom quiz

Arkom quiz

University

27 Qs

Geographic Information System

Geographic Information System

University

25 Qs

CASP+: Chapter5(3of3)

CASP+: Chapter5(3of3)

Assessment

Quiz

Computers

University

Hard

Created by

Khairul Imtiyaz

Used 1+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following scenarios is Role-Based Access Control (RBAC) commonly implemented?

A) Regulating access to system resources and files in operating systems.

B) Filtering incoming emails based on predefined criteria.

C) Detecting and preventing potential security threats within a network.

D) Analyzing network traffic patterns and comparing them against predefined rules.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a network environment where incoming and outgoing network traffic needs to be regulated based on predefined rules, which security solution utilizes rule-based access control?

A) Intrusion Detection and Prevention Systems (IDPS)

B) Web Application Firewalls (WAF)

C) Network Firewalls

D) Email Filtering Systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication protocol is commonly used for centralized authentication and directory services?

A) Lightweight Directory Access Protocol (LDAP)

B) Remote Authentication Dial-In User Service (RADIUS)

C) Diameter

D) Terminal Access Controller Access-Control System Plus (TACACS+)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology is primarily used to manage and enforce digital rights for copyrighted content?

Configuring Digital Watermarks in Azure

Digital Rights Management (DRM)

Data Loss Detection

Watermarking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What method involves modifying sensitive data in a way that it cannot be traced back to the original data subject, ensuring privacy while allowing for data analysis?

Noise Addition

Format-Preserving Encryption (FPE)

Scrambling or Shuffling

Anonymization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method involves replacing actual sensitive data with fictitious or altered data to protect privacy while maintaining usability?

Data obfuscation

Data encryption

Data segmentation

Data anonymization

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication protocol is commonly used for centralized user authentication and accounting for network access?

A) Single Sign-On (SSO)

B) Remote Authentication Dial-In User Service (RADIUS)

C) Diameter

D) Lightweight Directory Access Protocol (LDAP)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?