Security test 3

Security test 3

12th Grade

85 Qs

quiz-placeholder

Similar activities

Kinn's Chapter 6, 7, 8, 9, 10, 11 Test Review

Kinn's Chapter 6, 7, 8, 9, 10, 11 Test Review

security test

security test

Security+ Practice

Security+ Practice

Marketing Final/Certification Review 3

Marketing Final/Certification Review 3

Technology and Privacy Quiz

Technology and Privacy Quiz

Security test 2

Security test 2

Security test 3

Security test 3

Assessment

Quiz

Instructional Technology

12th Grade

Hard

Created by

Keegan Yap

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

85 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A finance company is legally required to maintain seven

years of tax records for all of their customers. Which of

the following would be the BEST way to implement this

requirement?

Create an automated script to remove all tax

information more than seven years old

Print and store all tax records in a seven-year cycle

Allow users to download tax records from their

account login

Create a separate daily backup archive for all

applicable tax records

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator is designing a data center for an

insurance company’s new public cloud and would like

to restrict user access to sensitive data. Which of the

following would provide ongoing visibility, data security,

and control of cloud-based applications?

HSM

CASB

802.1X

EDR

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

DDoS

Wireless disassociation

Rogue access point

ARP poisoning

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator has identified an internally

developed application that allows users to modify SQL

queries through a web-based front-end. To prevent this

modification, the administrator has recommended that

all queries be completely removed from the application

front-end and placed onto the back-end of the application

server. Which of the following would describe this

implementation?

Input validation

Code signing

Stored procedures

Obfuscation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator is implementing a fingerprint

scanner to provide access to the data center. Which of

these metrics should be kept at a minimum in order to

prevent unauthorized persons from accessing the

data center?

TOTP

FRR

HOTP

FAR

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT department of a transportation company

maintains an on-site inventory of chassis-based network

switch interface cards. If a failure occurs, the on-site

technician can replace the interface card and have the

system running again in sixty minutes. Which of the

following BEST describes this recovery metric?

MTBF

MTTR

RPO

RTO

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company maintains a server farm in a large data

center. These servers are for internal use only and are not

accessible externally. The security team has discovered

that a group of servers was breached before the latest

updates were applied. Breach attempts were not logged

on any other servers. Which of these threat actors would

be MOST likely involved in this breach?

Competitor

Insider

Nation state

Script kiddie

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?