Search Header Logo

SYS-1

Authored by Kyla Jieyn

Other

12th Grade

Used 3+ times

SYS-1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following answers can be used to describe technical security controls? (Select 3 answers)

Sometimes called logical security controls

Executed by computer systems (instead of people)

Focused on protecting material assets

Also known as administrative controls

Implemented with technology

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the answers listed below refer to examples of technical security controls? (Select 3 answers)

Organizational security policy

Encryption

IDSs

Security audits

Firewalls

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following answers refer to the characteristic features of managerial security controls? (Select 3 answers)

Also known as administrative controls

Focused on reducing the risk of security incidents

Documented in written policies

Executed by computer systems (instead of people)

Sometimes referred to as logical security controls

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Examples of managerial security controls include: (Select 3 answers)

Configuration management

Data backups

Organizational security policy

Risk assessments

Security awareness training

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the answers listed below can be used to describe operational security controls (Select 3 answers)

Also known as administrative controls

Focused on managing risk

Used to ensure that the equipment continues to work as specified

Focused on the day-to-day procedures of an organization

   Primarily implemented and executed by people (as opposed to computer systems)

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following examples fall into the category of operational security controls? (Select 3 answers)

Risk assessments

Configuration management

System backups

Authentication protocols

Patch management

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Which of the answers listed below refers to security controls designed to deter, detect, and prevent unauthorized access, theft, damage, or destruction of material assets?

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?