Microsoft SC-900 Day 5 & 6

Microsoft SC-900 Day 5 & 6

Professional Development

15 Qs

quiz-placeholder

Similar activities

DBMS Advanced Features and Distributed Databases

DBMS Advanced Features and Distributed Databases

Professional Development

10 Qs

CIW IBA Lesson 6 Vocabulary

CIW IBA Lesson 6 Vocabulary

8th Grade - Professional Development

16 Qs

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

SEC+ Ch.6 Review Test

SEC+ Ch.6 Review Test

Professional Development

15 Qs

ITF+ Ch7, Database Fundamentals

ITF+ Ch7, Database Fundamentals

Professional Development

20 Qs

OSI LAYER

OSI LAYER

KG - Professional Development

10 Qs

Cybersecurity

Cybersecurity

Professional Development

10 Qs

Network Fundamentals-Physical layer

Network Fundamentals-Physical layer

9th Grade - Professional Development

14 Qs

Microsoft SC-900 Day 5 & 6

Microsoft SC-900 Day 5 & 6

Assessment

Quiz

Computers

Professional Development

Hard

Created by

DICKO SUMARDIYANSAH

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Who approves the incident response policy?

(ISC)²

Senior management

The security manager

Investor

2.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

True of False? Business continuity planning is a reactive procedure that restores business operations after a disruption occurs.

True

False

3.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Which of the following is likely to be included in the business continuity plan?

Alternate work areas for personnel affected by a natural disaster

The organization’s strategic security approach

Last year’s budge information

Log data from all systems

4.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Tekila works for a government agency. All data in the agency is assigned a particular sensitivity level, called a "classification." Every person in the agency is assigned a "clearance" level, which determines the classification of data each person can access. What is the access control model being implemented in Tekila's agency?

MAC (mandatory access control)

DAC (discretionary access control)

RBAC (role-based access control)

FAC (formal access control)

5.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

In order for a biometric security to function properly, an authorized person's physiological data must be ______.

Broadcast

Stored

Deleted

Modified

6.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control scheme for the company. Handel wants to ensure that operational managers have the utmost personal choice in determining which employees get access to which systems/data. Which method should Handel select?

Role-based access control (RBAC)

Mandatory access control (MAC)

Discretionary access control (DAC)

Security policy

7.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Which of the following roles does not typically require privileged account access?

Security administrator

Data entry professional

System administrator

Help Desk technician

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?