Sec Review 3

Sec Review 3

University

10 Qs

quiz-placeholder

Similar activities

QUIZZ 1 : DATABASE FUNDAMENTALS

QUIZZ 1 : DATABASE FUNDAMENTALS

University

10 Qs

Determining System Requirements

Determining System Requirements

University

11 Qs

INTO Artificial Intelligence

INTO Artificial Intelligence

University - Professional Development

10 Qs

ITF Chapter 1 Computing Devices

ITF Chapter 1 Computing Devices

University

14 Qs

Application Development Midterm Quiz

Application Development Midterm Quiz

University

15 Qs

Network Management Week 14

Network Management Week 14

University

10 Qs

Testeo de equipos - BIOS

Testeo de equipos - BIOS

University

10 Qs

How Safe are you? (Disclaimer: I do not own these questions)

How Safe are you? (Disclaimer: I do not own these questions)

University

10 Qs

Sec Review 3

Sec Review 3

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Tony Diaz

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which type of security control aims to limit the damage of an attack after it has occurred?

Preventive

Detective

Corrective

Deterrent

2.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What is non-repudiation primarily concerned with?

Ensuring system uptime

Proving the origin of a message

Ensuring data is not tampered with

Ensuring only authorized personnel access data

3.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following is an asymmetric encryption algorithm?

AES

RSA

Blowfish

Triple DES

4.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Indicators of malicious activity might include all of the following EXCEPT:

Impossible travel

Concurrent session usage

Blocked content

Patching frequency

5.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following threat actors is most likely to be motivated by financial gain?

Nation-state

Hacktivist

Organized crime

Insider threat

6.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What data classification would be most appropriate for a company’s press releases that get shared openly?

Public

Restricted

Sensitive

Confidential

7.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

In the context of a network’s attack surface, what does device placement primarily influence?

Device power consumption.

Scalability of the network.

Exposure to potential threats.

Responsiveness of microservices.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?