
Security+ Domain 1
Authored by Kari Cobb
Computers
12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
49 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following statements about honeyfiles are true? (Select two.)
Honeyfiles work with network intrusion detection systems (NIDs) and can help prevent false positives.
Honeyfiles can only be created by system administrators.
Honeyfiles are designed to provide real data to the attacker.
Honeyfiles are named in a way that makes them attractive to hackers, enticing them to open or execute them.
Honeyfiles are used to block all types of malicious traffic.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?
Smart card
Keypad locks
Proximity card
Biometric locks
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following are control categories? (Select three.)
Preventative
Operational
Managerial
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a system administrator at a software company. You have been tasked with verifying the integrity of a large software update file that has been downloaded from the internet. The software provider has provided a SHA256 hash of the file for verification purposes. You decide to use the Get-FileHash command in PowerShell to calculate the hash of the downloaded file. Which of the following scenarios best demonstrates the correct use of the Get-FileHash command for this purpose?
You use the Get-FileHash command to calculate the hash of the downloaded file and send it to the software provider for verification.
You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash provided by the software provider. If the hashes match, you assume the file has not been tampered with.
You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash of another file downloaded from the internet. If the hashes match, you assume the file has not been tampered with.
You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash of the original file on your system. If the hashes match, you assume the file has not been tampered with.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the term for the process of validating a subject's identity?
Authorization
Authentication
Auditing
Identification
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate?
MD5
SHA
RIPEMD
HMAC
7.
OPEN ENDED QUESTION
3 mins • 1 pt
A newly launched online store wants to secure transactions between the store and customers. The store must guarantee the authenticity of transactions, provide confidentiality, and ensure that only authorized recipients can access the purchase details.
Evaluate responses using AI:
OFF
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
50 questions
MID INFORMATIKA
Quiz
•
9th - 12th Grade
52 questions
Media and Information Literacy (Generated)
Quiz
•
12th Grade
47 questions
MS Word Preliminary Examination
Quiz
•
10th Grade - University
53 questions
Računarski hardver
Quiz
•
9th - 12th Grade
45 questions
Informatika Sekarang dan Masa Depan
Quiz
•
12th Grade
50 questions
UJIAN SEKOLAH PRODUKTIF TKJ KELAS XII
Quiz
•
12th Grade
49 questions
Career Trivia Quiz
Quiz
•
8th - 12th Grade
50 questions
EOPA Overall Review #2 Random
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade