Security+ Domain 1

Security+ Domain 1

12th Grade

•

49 Qs

quiz-placeholder

Similar activities

Network Security Vocab Part 1

Network Security Vocab Part 1

Access Control Vocab

Access Control Vocab

Information Security Quiz

Information Security Quiz

IT Chapter 13

IT Chapter 13

MS Unit 4 Review

MS Unit 4 Review

Sec+ review

Sec+ review

Security+ Domain 1

Security+ Domain 1

Assessment

Quiz

•

Computers

•

12th Grade

•

Practice Problem

•

Medium

Created by

Kari Cobb

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

49 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements about honeyfiles are true? (Select two.)

Honeyfiles work with network intrusion detection systems (NIDs) and can help prevent false positives.

Honeyfiles can only be created by system administrators.

Honeyfiles are designed to provide real data to the attacker.

Honeyfiles are named in a way that makes them attractive to hackers, enticing them to open or execute them.

Honeyfiles are used to block all types of malicious traffic.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?

Smart card

Keypad locks

Proximity card

Biometric locks

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are control categories? (Select three.)

Preventative

Operational

Managerial

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a system administrator at a software company. You have been tasked with verifying the integrity of a large software update file that has been downloaded from the internet. The software provider has provided a SHA256 hash of the file for verification purposes. You decide to use the Get-FileHash command in PowerShell to calculate the hash of the downloaded file. Which of the following scenarios best demonstrates the correct use of the Get-FileHash command for this purpose?

You use the Get-FileHash command to calculate the hash of the downloaded file and send it to the software provider for verification.

You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash provided by the software provider. If the hashes match, you assume the file has not been tampered with.

You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash of another file downloaded from the internet. If the hashes match, you assume the file has not been tampered with.

You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash of the original file on your system. If the hashes match, you assume the file has not been tampered with.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term for the process of validating a subject's identity?

Authorization

Authentication

Auditing

Identification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate?

MD5

SHA

RIPEMD

HMAC

7.

OPEN ENDED QUESTION

3 mins • 1 pt

A newly launched online store wants to secure transactions between the store and customers. The store must guarantee the authenticity of transactions, provide confidentiality, and ensure that only authorized recipients can access the purchase details.

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?