INF201 Module 1

INF201 Module 1

Professional Development

30 Qs

quiz-placeholder

Similar activities

C2.6 GE GENERAL GRAMMAR REVIEW UNITS 11  AND 12

C2.6 GE GENERAL GRAMMAR REVIEW UNITS 11 AND 12

Professional Development

25 Qs

English file vocab

English file vocab

Professional Development

29 Qs

Module 1 Final Exam

Module 1 Final Exam

Professional Development

30 Qs

English B2 / C1

English B2 / C1

Professional Development

25 Qs

Lesson 49 - English At Work

Lesson 49 - English At Work

Professional Development

27 Qs

Business Administration and Finance - Unit 18 - Burlington

Business Administration and Finance - Unit 18 - Burlington

Professional Development

25 Qs

Market Leader Intermediate Unit 8 Human Resources

Market Leader Intermediate Unit 8 Human Resources

Professional Development

25 Qs

Preintermediate English for Programmers - Test 1

Preintermediate English for Programmers - Test 1

Professional Development

30 Qs

INF201 Module 1

INF201 Module 1

Assessment

Quiz

English

Professional Development

Hard

Created by

Jeff Mac

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used to add extra complexity before using a one-way data transformation algorithm?
Key stretching
Data masking
Steganography
Salting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?
Compensating control
Network segmentation
Transfer of risk
SNMP traps

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security concepts is the best reason for permissions on a human resources fileshare to follow the principle of least privilege?
Integrity
Availability
Confidentiality
Non-repudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?
Corrective
Preventive
Detective
Deterrent

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users' passwords. Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?
Multifactor authentication
Permissions assignment
Access management
Password complexity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?
Secured zones
Subject role
Adaptive identity
Threat scope reduction

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator would like to protect data on employees' laptops. Which of the following encryption techniques should the security administrator use?
Partition
Asymmetric
Full disk
Database

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?