Sec+ Study Quiz 13

Sec+ Study Quiz 13

Professional Development

42 Qs

quiz-placeholder

Similar activities

MS-900 - Describe Microsoft 365 Pricing and Support

MS-900 - Describe Microsoft 365 Pricing and Support

Professional Development

37 Qs

QUIZ TIK

QUIZ TIK

Professional Development

40 Qs

AC Tema 2. Cuestionario

AC Tema 2. Cuestionario

Professional Development

39 Qs

Switch Staff Challenge 2025 - Explorer

Switch Staff Challenge 2025 - Explorer

Professional Development

41 Qs

ĐỀ KIỂM TRA HỌC KỲ 1 TIN 10

ĐỀ KIỂM TRA HỌC KỲ 1 TIN 10

Professional Development

40 Qs

UT 6.2 - Redes Locales. Nivel físico. Medios de transmisión.

UT 6.2 - Redes Locales. Nivel físico. Medios de transmisión.

Professional Development

38 Qs

Java Training Final Assessment

Java Training Final Assessment

Professional Development

40 Qs

ENSA 86-127

ENSA 86-127

Professional Development

42 Qs

Sec+ Study Quiz 13

Sec+ Study Quiz 13

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Pat Johnson

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following documents specifies what to do in the event of catastrophic loss of a physical or virtual system?

Data retention plan

Incident response plan

Disaster recovery plan

Communication plan

Answer explanation

The correct choice is the Disaster recovery plan, which specifies what to do in the event of catastrophic loss of a physical or virtual system.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following roles is responsible for defining the protection type and classification type for a given set of files?

General counsel

Data owner

Risk manager

Chief Information Officer

Answer explanation

The data owner is responsible for defining the protection type and classification type for a given set of files.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee's company email is configured with conditional access and requires that MFA is enabled and used. An example of MFA is a phone call and:

a push notification

a password

an SMS message

an authentication application

Answer explanation

The correct choice for MFA in the scenario described is an authentication application, which is an example of a method used for multi-factor authentication.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security implication of newer ICS devices that are becoming more common in corporations?

Devices with cellular communication capabilities bypass traditional network security controls

Many devices do not support elliptic-curve encryption algorithms due to the overhead they require

These devices often lack privacy controls and do not meet newer compliance regulations

Unauthorized voice and audio recording can cause loss of intellectual property

Answer explanation

Devices with cellular communication capabilities bypass traditional network security controls, posing a security risk in corporations.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?

Hashing

DNS sinkhole

TLS inspection

Data masking

Answer explanation

TLS inspection is required for an IDS and a WAF to be effective on HTTPS traffic as it allows for the decryption and analysis of encrypted traffic.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company policy requires third-party suppliers to self-report data breaches within a specific time frame. Which of the following third-party risk management policies is the company complying with?

MOU

SLA

EOL

NDA

Answer explanation

The company is complying with the SLA policy by requiring third-party suppliers to self-report data breaches within a specific time frame.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While troubleshooting service disruption on a mission-critical server, a technician discovered the user account that was configured to run automated processes was disabled because the user's password failed to meet password complexity requirements. Which of the following would be the best solution to securely prevent future issues?

Using an administrator account to run the processes and disabling the account when it is not in use

Implementing a shared account the team can use to run automated processes

Configuring a service account to run the processes

Removing the password complexity requirements for the user account

Answer explanation

Configuring a service account to run the processes is the best solution as it ensures secure automation without relying on individual user accounts.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?