Sec+ 601

Sec+ 601

Professional Development

10 Qs

quiz-placeholder

Similar activities

Cooku  with Comali

Cooku with Comali

1st Grade - Professional Development

14 Qs

Guess That Fortnite Streamer

Guess That Fortnite Streamer

KG - Professional Development

10 Qs

FF

FF

KG - Professional Development

10 Qs

fall guys

fall guys

2nd Grade - Professional Development

9 Qs

Data Quality - Lunch and Learn 01/08/2019

Data Quality - Lunch and Learn 01/08/2019

Professional Development

10 Qs

NBA TEAMS

NBA TEAMS

KG - Professional Development

12 Qs

EXÁMEN  TÉCNICA FIJA GRUPO G-18 y G-20

EXÁMEN TÉCNICA FIJA GRUPO G-18 y G-20

Professional Development

10 Qs

SmartConBeninCity Watch Party

SmartConBeninCity Watch Party

Professional Development

10 Qs

Sec+ 601

Sec+ 601

Assessment

Quiz

Other

Professional Development

Hard

Created by

Hope Pate

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The states of data are which of the following?

At rest

In processing

In storage

In transit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term that describes fake network traffic in a deception-based environment is...

DNS sinkhole

Honeypot

Fake telemetry

Masking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technologies facilitates security monitoring of encrypted communication channels when end-to-end encryption is used?

Tokenization

TLS inspections

Masking

Hashing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following topics are a part of data protection?

Masking

Honeypots

DNS Sinkholes

Tokenization

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The plan that helps an organization relocate to an emergency site?

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________________ is important to consider when specifically examining configuration management.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The purpose of deception in an enterprise include the following:

Identifying misconfigured systems

To trick attackers into stealing fake data

To provide a place to test new systems

To allow easy identification of unauthorized actors

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?