Sec+ Study Quiz 13

Sec+ Study Quiz 13

Professional Development

42 Qs

quiz-placeholder

Similar activities

CITL3 Review

CITL3 Review

Professional Development

39 Qs

CCNA ITN : Chapter 1

CCNA ITN : Chapter 1

Professional Development

39 Qs

Network Technology - Finals Reviewer 04

Network Technology - Finals Reviewer 04

Professional Development

40 Qs

A+ 1101 Study Quiz 1

A+ 1101 Study Quiz 1

Professional Development

46 Qs

C&SE PRE-KNOWLEDGE SURVEY (A+ 1102-CORE 2)

C&SE PRE-KNOWLEDGE SURVEY (A+ 1102-CORE 2)

University - Professional Development

40 Qs

Randy's Networking Quiz 2

Randy's Networking Quiz 2

Professional Development

40 Qs

Azure Quiz 1b

Azure Quiz 1b

Professional Development

43 Qs

MS 900 Review Exam

MS 900 Review Exam

Professional Development

47 Qs

Sec+ Study Quiz 13

Sec+ Study Quiz 13

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Pat Johnson

FREE Resource

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following documents specifies what to do in the event of catastrophic loss of a physical or virtual system?

Data retention plan

Incident response plan

Disaster recovery plan

Communication plan

Answer explanation

The correct choice is the Disaster recovery plan, which specifies what to do in the event of catastrophic loss of a physical or virtual system.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following roles is responsible for defining the protection type and classification type for a given set of files?

General counsel

Data owner

Risk manager

Chief Information Officer

Answer explanation

The data owner is responsible for defining the protection type and classification type for a given set of files.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee's company email is configured with conditional access and requires that MFA is enabled and used. An example of MFA is a phone call and:

a push notification

a password

an SMS message

an authentication application

Answer explanation

The correct choice for MFA in the scenario described is an authentication application, which is an example of a method used for multi-factor authentication.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security implication of newer ICS devices that are becoming more common in corporations?

Devices with cellular communication capabilities bypass traditional network security controls

Many devices do not support elliptic-curve encryption algorithms due to the overhead they require

These devices often lack privacy controls and do not meet newer compliance regulations

Unauthorized voice and audio recording can cause loss of intellectual property

Answer explanation

Devices with cellular communication capabilities bypass traditional network security controls, posing a security risk in corporations.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?

Hashing

DNS sinkhole

TLS inspection

Data masking

Answer explanation

TLS inspection is required for an IDS and a WAF to be effective on HTTPS traffic as it allows for the decryption and analysis of encrypted traffic.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company policy requires third-party suppliers to self-report data breaches within a specific time frame. Which of the following third-party risk management policies is the company complying with?

MOU

SLA

EOL

NDA

Answer explanation

The company is complying with the SLA policy by requiring third-party suppliers to self-report data breaches within a specific time frame.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While troubleshooting service disruption on a mission-critical server, a technician discovered the user account that was configured to run automated processes was disabled because the user's password failed to meet password complexity requirements. Which of the following would be the best solution to securely prevent future issues?

Using an administrator account to run the processes and disabling the account when it is not in use

Implementing a shared account the team can use to run automated processes

Configuring a service account to run the processes

Removing the password complexity requirements for the user account

Answer explanation

Configuring a service account to run the processes is the best solution as it ensures secure automation without relying on individual user accounts.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?