Sec Review 4

Sec Review 4

University

10 Qs

quiz-placeholder

Similar activities

UIT 2221 MALWARE (COPTPA)

UIT 2221 MALWARE (COPTPA)

University

15 Qs

software development LAB

software development LAB

University

10 Qs

Introduction to information technology

Introduction to information technology

University

9 Qs

AB1401 Case Study: Facebook

AB1401 Case Study: Facebook

University

12 Qs

Vocabulary Quiz - Computer - 01

Vocabulary Quiz - Computer - 01

12th Grade - University

10 Qs

C Wrapup Quiz Deutsch

C Wrapup Quiz Deutsch

University

12 Qs

Google Calendar

Google Calendar

University

10 Qs

SCM and Logistics

SCM and Logistics

University

11 Qs

Sec Review 4

Sec Review 4

Assessment

Quiz

Computers

University

Medium

Created by

Tony Diaz

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

A business conducts a test where they intentionally leave USB drives in the parking lot to see if employees will pick them up and plug them into company computers. This test is primarily to raise awareness about:

Password management

Insider threats

Social engineering

Phishing

2.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

An organization decides not to do business in a country due to the high risk of data breaches and cyber threats. This is an example of which risk management strategy?

Avoid

Transfer

Accept

Mitigate

3.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

A vendor is subjected to a simulated cyber-attack to evaluate their security posture. What method is being used?

Penetration testing

Due diligence

Vendor monitoring

Supply chain analysis

4.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following is an example of an operational control?

Access badge

Incident response plan

Firewall

Security policy

5.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following is NOT a component of the Zero Trust model?

Policy Administrator

Policy Engine

Policy Enforcement Point

Policy Execution Point

6.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What is the primary purpose of salting in cryptographic solutions?

To securely store a copy of cryptographic keys.

To replace sensitive data with non-sensitive placeholders.

To add randomness to a password before hashing it.

To verify the integrity and authenticity of a digital message or document.

7.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

An organization’s decision to implement multi-factor authentication (MFA) after identifying potential authentication vulnerabilities is an example of which risk management strategy?

Avoid

Mitigate

Accept

Transfer

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?