Asset Management

Asset Management

Professional Development

17 Qs

quiz-placeholder

Similar activities

ITIL 4 Foundation_ITIL Practices

ITIL 4 Foundation_ITIL Practices

Professional Development

20 Qs

BCS Systems & Architecture Raymond's Quiz

BCS Systems & Architecture Raymond's Quiz

University - Professional Development

15 Qs

CyberSecurity

CyberSecurity

Professional Development

12 Qs

FPHL Tech Quiz

FPHL Tech Quiz

Professional Development

13 Qs

IT User Fundamentals

IT User Fundamentals

Professional Development

18 Qs

SmartHub On Easy Payment

SmartHub On Easy Payment

Professional Development

16 Qs

Chapter 5 Pre-Assessment

Chapter 5 Pre-Assessment

Professional Development

16 Qs

FICO 3

FICO 3

Professional Development

21 Qs

Asset Management

Asset Management

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Dove Soap

Used 1+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary benefit of maintaining an up-to-date Configuration Management Database (CMDB)?

It reduces the cost of new asset procurement

It tracks network traffic between systems

It provides a centralized repository of assets and their interdependencies

It monitors system performance in real-time

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary benefit of asset tracking in cybersecurity?

Reduced insurance premiums

Enhanced visibility of hardware and software

Improved incident response time

  • Better social engineering defense

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a data protection method that captures the state of a virtual machine for easy rollback in case of failure?

SAN snapshot

VM snapshot

Full backup

File-level journaling

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines "data deduplication"?

Creating multiple identical copies of data

Reducing the size of backups by eliminating duplicate copies of data

Encrypting all backup data

Separating critical and non-critical data for storage

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools is most appropriate for automating the discovery of network-connected devices?

Nessus

Firewall

IDS/IPS

Anti-virus software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When decommissioning a device containing sensitive data, which of the following is the most secure method of ensuring that the data cannot be recovered?

Factory reset

Data wiping with multiple overwrites

Disk encryption

Physical destruction of the device

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be the most effective control to ensure that backups cannot be altered by unauthorized users once they have been created?

Implement write-protected media

Encrypt the backups with a strong encryption algorithm

Store the backups in a separate offsite facility

Enable logging and monitoring of backup access

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?