SEC+ Mod 3 Part 2

SEC+ Mod 3 Part 2

12th Grade

76 Qs

quiz-placeholder

Similar activities

Routing & Switching

Routing & Switching

12th Grade

75 Qs

networking conceots

networking conceots

8th Grade - University

78 Qs

Final Exam Answers Full - ENSA (71-140)

Final Exam Answers Full - ENSA (71-140)

12th Grade

71 Qs

Exploration of IT - Unit 4 Post Test

Exploration of IT - Unit 4 Post Test

9th - 12th Grade

71 Qs

IT Skills and Concepts Quiz

IT Skills and Concepts Quiz

10th Grade - University

75 Qs

CTEC IT Revision

CTEC IT Revision

12th Grade

74 Qs

ITE8 - Module 10 Terms

ITE8 - Module 10 Terms

12th Grade

71 Qs

ITF+ Full Practice Set 1

ITF+ Full Practice Set 1

12th Grade

75 Qs

SEC+ Mod 3 Part 2

SEC+ Mod 3 Part 2

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Pat Johnson

FREE Resource

76 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key practice in Patch Management?

Keeping all software, operating systems, and applications up to date with security patches.

Assigning permissions and access rights to all users.

Disabling unnecessary services and ports.

Educating users about security best practices.

Answer explanation

Keeping all software, operating systems, and applications up to date with security patches is a key practice in Patch Management.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the principle of Least Privilege ensure?

All users have full access to all systems.

Users and systems are provided with only the minimum access required to accomplish their tasks.

All unnecessary services are enabled.

Networks are segmented to limit lateral movement.

Answer explanation

Users and systems are provided with only the minimum access required to accomplish their tasks.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a security measure mentioned in the document?

Patch Management

Least Privilege

Network Segmentation

Full System Access

Answer explanation

The correct choice is 'Full System Access' because it is NOT a security measure mentioned in the document.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Network Segmentation?

To provide full access to all users.

To segment networks and limit lateral movement and isolate critical assets.

To disable unnecessary services.

To educate users about security best practices.

Answer explanation

To segment networks and limit lateral movement and isolate critical assets.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security tool mentioned for Implementing Security Controls?

Antivirus

Network Segmentation

Patch Management

User Training

Answer explanation

The security tool mentioned for Implementing Security Controls is Antivirus.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the focus of User Training in security measures?

Educating users about security best practices.

Disabling unnecessary services.

Keeping software up to date.

Segmenting networks.

Answer explanation

User Training in security measures focuses on educating users about security best practices to enhance overall security awareness and reduce risks associated with human error.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should be considered when placing and configuring security devices?

Device connectivity and failure modes.

User access levels.

Software update schedules.

Network segmentation.

Answer explanation

Device connectivity and failure modes should be considered when placing and configuring security devices to ensure proper functionality and response in case of failures.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?