Search Header Logo

CASP+: Chapter5(3of3)

Authored by Khairul Imtiyaz

Computers

University

Used 1+ times

CASP+: Chapter5(3of3)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following scenarios is Role-Based Access Control (RBAC) commonly implemented?

A) Regulating access to system resources and files in operating systems.

B) Filtering incoming emails based on predefined criteria.

C) Detecting and preventing potential security threats within a network.

D) Analyzing network traffic patterns and comparing them against predefined rules.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a network environment where incoming and outgoing network traffic needs to be regulated based on predefined rules, which security solution utilizes rule-based access control?

A) Intrusion Detection and Prevention Systems (IDPS)

B) Web Application Firewalls (WAF)

C) Network Firewalls

D) Email Filtering Systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication protocol is commonly used for centralized authentication and directory services?

A) Lightweight Directory Access Protocol (LDAP)

B) Remote Authentication Dial-In User Service (RADIUS)

C) Diameter

D) Terminal Access Controller Access-Control System Plus (TACACS+)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology is primarily used to manage and enforce digital rights for copyrighted content?

Configuring Digital Watermarks in Azure

Digital Rights Management (DRM)

Data Loss Detection

Watermarking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What method involves modifying sensitive data in a way that it cannot be traced back to the original data subject, ensuring privacy while allowing for data analysis?

Noise Addition

Format-Preserving Encryption (FPE)

Scrambling or Shuffling

Anonymization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method involves replacing actual sensitive data with fictitious or altered data to protect privacy while maintaining usability?

Data obfuscation

Data encryption

Data segmentation

Data anonymization

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication protocol is commonly used for centralized user authentication and accounting for network access?

A) Single Sign-On (SSO)

B) Remote Authentication Dial-In User Service (RADIUS)

C) Diameter

D) Lightweight Directory Access Protocol (LDAP)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?