Sec+ | Important Notes

Sec+ | Important Notes

Professional Development

12 Qs

quiz-placeholder

Similar activities

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

6th Grade - Professional Development

10 Qs

NHANH TAY, NHANH MẮT

NHANH TAY, NHANH MẮT

Professional Development

10 Qs

Microsoft 365 for Teachers

Microsoft 365 for Teachers

Professional Development

10 Qs

Introduction to AI - Healthcare & Business

Introduction to AI - Healthcare & Business

University - Professional Development

10 Qs

Gli indirizzi IP

Gli indirizzi IP

9th Grade - Professional Development

15 Qs

Python Quiz For Starters

Python Quiz For Starters

3rd Grade - Professional Development

17 Qs

Java Strings and lops

Java Strings and lops

Professional Development

10 Qs

PowerShell 3.1-Tuberías (I)

PowerShell 3.1-Tuberías (I)

Professional Development

15 Qs

Sec+ | Important Notes

Sec+ | Important Notes

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

Prem Jadhwani

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MATCH QUESTION

3 mins • 5 pts

Match the Security Control to its purpose

SIEM

Software that automates a response when set up

Network Access Control (NAC)

Stops sensitive data exfiltration

Intrusion Prevention System (IPS)

Software that detects and STOPS an attack in real-time

Data Loss Prevention (DLP)

Security technologies that work together to screen devices for health conditions before accessing a network

SOAR

Software that Aggregates log data and acts as workforce multiplier

2.

MATCH QUESTION

3 mins • 5 pts

Match the tool that is used for the provided purpose:

Wireshark (PCAP)

Best way to see internal to external conversations between computers

Tabletop Exercise (TTX)

Best way to test your Incident Response Plan (IRP)

Mobile Device Manager (MDM)

Best way to control company data on a laptop or cellular phone.

Firewall Logs

Best way to store credit card data in a database is to replace it with a placeholder.

Data Tokenization

Best tool to use to capture data packets going between computers.

3.

MATCH QUESTION

3 mins • 5 pts

Match the following:

Business Impact Analysis (BIA)

Best way to transfer risk involved with a security incident.

Compliance Attestation

A report provided by a vendor stating that we meet certain regulatory requirements

Playbook

A policy that outlines how long we must store and maintain data

Cyber Insurance

Step by step guide to responding to a security incident

Data Retention

Report that shows how things are affected when a security incident happens.

4.

MATCH QUESTION

3 mins • 5 pts

Match the regulatory laws to their definition.

ISO 27002

Supporting document that provides security controls to orgs that are required to have ISMS.

General Data Privacy Regulation (GDPR)

Requires companies handle PII in a manner that keeps it private.

ISO 27001

Privacy law that applies to European Citizens regarding their privacy rights.

PCI DSS

Requires an organization to set up an ISMS if they deal with sensitive info.

ISO 27701

Law that governs how an organization handles credit/debit card data.

5.

MATCH QUESTION

3 mins • 5 pts

Match the following terms to their appropriate definitions.

Recovery Time Objective (RTO)

This is the maximum amount of time equipment can be down.

Annual Loss Expectancy (ALE)

This is the maximum amount of data that can be lost.

Single Loss Expectancy (SLE)

The amount of money we can expect to lose in a given year due to events occurring.

Recovery Point Objective (RPO)

The amount of money we can expect to lose if something occurs.

Annual Rate of Occurrence (ARO)

The number of times something happens in a given year.

6.

MATCH QUESTION

3 mins • 5 pts

Match the appropriate solution with the problem.

Data Loss Prevention (DLP)

Jon needs a tool that will help him identify if anything in a file system has changed.

Cloud Access Security Broker (CASB)

Terry wants to enforce security policies on the cloud.

File Integrity Monitoring (FIM)

Mandy needs to create a way to rollback to a previous point if something goes wrong.

Gap Analysis

Sierra wants to prevent employees from sending sensitive info in email.

Backout Plan

Dameon needs to determine everything that needs to be done to get into compliance.

7.

MATCH QUESTION

3 mins • 5 pts

Match the following documents to their purpose

BCP

A formal document that an employee signs to ensure they understand what they are allowed to use an asset for.

BIA

A plan that we put into place to maintain continuity in the event of a disaster or attack.

SLA

Legal agreement between two parties that outlines service requirements. Often denotes 99.9% uptime.

SOW

A complete analysis on how a situation or event would impact the organization.

AUP


A plan that outlines scope of a job, the completion timeline and the cost.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?