
Practice Test
Authored by shyrlyn valdez
Other
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Is it possible to avoid Risk?
Yes
No
Sometimes
Never
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is very likely to be used in a disaster recovery effort?
Guard dogs
Data backups
Contract personnel
Antimalware solutions
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Wade logs on to a system in order to read a file. In this example, Derrick is the _________.
Subject
Object
Process
Predicate
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a subject?
A file
A fence
A filename
A user
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A common network device used to filter traffic
A Server
Endpoint
Ethernet
Firewall
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who is responsible for publishing and signing the organization's policies
The Security Office
Human Resources
Senior Management
The Legal Department
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A set of security controls or system settings used to ensure uniformity of configuration through the IT environment
Patches
Inventory
Baseline
Policy
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?