Sec+ | Important Notes

Sec+ | Important Notes

Professional Development

12 Qs

quiz-placeholder

Similar activities

ITFN Test 3

ITFN Test 3

KG - Professional Development

11 Qs

AWS Cloud

AWS Cloud

Professional Development

15 Qs

Computer Basics Quiz

Computer Basics Quiz

Professional Development

7 Qs

Part 1.1

Part 1.1

Professional Development

10 Qs

Supervised and unsupervised learning

Supervised and unsupervised learning

Professional Development

15 Qs

Google Cloud Digital Leader - Application

Google Cloud Digital Leader - Application

Professional Development

10 Qs

Vlookup Formula in Excel

Vlookup Formula in Excel

Professional Development

10 Qs

DP 203 M2

DP 203 M2

Professional Development

10 Qs

Sec+ | Important Notes

Sec+ | Important Notes

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Prem Jadhwani

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MATCH QUESTION

3 mins • 5 pts

Match the Security Control to its purpose

Network Access Control (NAC)

Software that automates a response when set up

Data Loss Prevention (DLP)

Stops sensitive data exfiltration

SOAR

Software that Aggregates log data and acts as workforce multiplier

Intrusion Prevention System (IPS)

Software that detects and STOPS an attack in real-time

SIEM

Security technologies that work together to screen devices for health conditions before accessing a network

2.

MATCH QUESTION

3 mins • 5 pts

Match the tool that is used for the provided purpose:

Firewall Logs

Best way to see internal to external conversations between computers

Mobile Device Manager (MDM)

Best way to test your Incident Response Plan (IRP)

Tabletop Exercise (TTX)

Best way to control company data on a laptop or cellular phone.

Data Tokenization

Best tool to use to capture data packets going between computers.

Wireshark (PCAP)

Best way to store credit card data in a database is to replace it with a placeholder.

3.

MATCH QUESTION

3 mins • 5 pts

Match the following:

Data Retention

Step by step guide to responding to a security incident

Cyber Insurance

Report that shows how things are affected when a security incident happens.

Playbook

A policy that outlines how long we must store and maintain data

Compliance Attestation

A report provided by a vendor stating that we meet certain regulatory requirements

Business Impact Analysis (BIA)

Best way to transfer risk involved with a security incident.

4.

MATCH QUESTION

3 mins • 5 pts

Match the regulatory laws to their definition.

General Data Privacy Regulation (GDPR)

Requires an organization to set up an ISMS if they deal with sensitive info.

PCI DSS

Supporting document that provides security controls to orgs that are required to have ISMS.

ISO 27701

Law that governs how an organization handles credit/debit card data.

ISO 27001

Requires companies handle PII in a manner that keeps it private.

ISO 27002

Privacy law that applies to European Citizens regarding their privacy rights.

5.

MATCH QUESTION

3 mins • 5 pts

Match the following terms to their appropriate definitions.

Single Loss Expectancy (SLE)

This is the maximum amount of time equipment can be down.

Recovery Point Objective (RPO)

This is the maximum amount of data that can be lost.

Recovery Time Objective (RTO)

The number of times something happens in a given year.

Annual Rate of Occurrence (ARO)

The amount of money we can expect to lose if something occurs.

Annual Loss Expectancy (ALE)

The amount of money we can expect to lose in a given year due to events occurring.

6.

MATCH QUESTION

3 mins • 5 pts

Match the appropriate solution with the problem.

File Integrity Monitoring (FIM)

Mandy needs to create a way to rollback to a previous point if something goes wrong.

Data Loss Prevention (DLP)

Dameon needs to determine everything that needs to be done to get into compliance.

Backout Plan

Jon needs a tool that will help him identify if anything in a file system has changed.

Gap Analysis

Sierra wants to prevent employees from sending sensitive info in email.

Cloud Access Security Broker (CASB)

Terry wants to enforce security policies on the cloud.

7.

MATCH QUESTION

3 mins • 5 pts

Match the following documents to their purpose

SOW

A formal document that an employee signs to ensure they understand what they are allowed to use an asset for.

AUP


A plan that outlines scope of a job, the completion timeline and the cost.

SLA

A plan that we put into place to maintain continuity in the event of a disaster or attack.

BCP

Legal agreement between two parties that outlines service requirements. Often denotes 99.9% uptime.

BIA

A complete analysis on how a situation or event would impact the organization.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?