Mid Test SC900

Mid Test SC900

University

25 Qs

quiz-placeholder

Similar activities

C Programming Unit-1 Test-2

C Programming Unit-1 Test-2

University

20 Qs

TEST1.PY

TEST1.PY

10th Grade - University

20 Qs

6INFOMAN (Recitation)

6INFOMAN (Recitation)

University - Professional Development

20 Qs

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

University

20 Qs

Informática

Informática

University

20 Qs

QUIZ 2

QUIZ 2

University

20 Qs

Review Quiz (Chapter 3&4)

Review Quiz (Chapter 3&4)

University

20 Qs

ĐC CNTT_Chương 1

ĐC CNTT_Chương 1

University

20 Qs

Mid Test SC900

Mid Test SC900

Assessment

Quiz

Computers

University

Hard

Created by

Musayyanah Musayyanah

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a "something you know"

User ID

Password

Fingerprint

Iris scan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Within the organization, who can identify risk?

The security manager

Any security team member

Senior management

Anyone

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A vendor sells a particular operating system (OS). In order to deploy the OS securely on different platforms, the vendor publishes several sets of instructions on how to install it, depending on which platform the customer is using. This is an example of a .......

Law

Procedure

Standard

Policy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Of the following, which would probably not be considered a threat?

Natural DIsaster

Unintentional damage to the system caused by a user

A laptop with sensitivie data on it

An external attacker trying to gain unauthorized access to the environment

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For which of the following assests is integrity probably the most important security aspect?

One frame of a streaming video

The file that contains passwords used to authenticate users

The color scheme of a marketing website

Software that checks the spelling of product descriptions for a retail website

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kerpak works in the security office of a medium-sized entertainment company. Kerpak is asked to assess a particular threat, and he suggests that

the best way to counter this threat would be to purchase and implement a particular security solution. This is an example of ......

Acceptance

Avoidance

Mitigation

Transference

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Triffid Corporation publishes a policy that states all personnel will act in a manner that protects health and human safety. The security office is tasked with writing a detailed set of processes on how employees should wear protective gear such a hardhat and gloves when in haradous areas. This detailed set of process is a ......

Policy

Procedure

Standard

Law

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?