67 Question Sec+ Quiz

67 Question Sec+ Quiz

12th Grade

58 Qs

quiz-placeholder

Similar activities

Nervous System

Nervous System

11th Grade - University

60 Qs

Unit 2: Review Nutrients & Dietary Guidelines

Unit 2: Review Nutrients & Dietary Guidelines

9th - 12th Grade

53 Qs

History

History

KG - Professional Development

53 Qs

Top 75 Drugs Test: Indications and Dosages

Top 75 Drugs Test: Indications and Dosages

12th Grade

56 Qs

Chapter 10-12 Investment Review

Chapter 10-12 Investment Review

10th Grade - University

61 Qs

Public Safety I Final Exam Review

Public Safety I Final Exam Review

9th - 12th Grade

56 Qs

Income Benefits and Taxes Test

Income Benefits and Taxes Test

12th Grade

54 Qs

Access Management Quiz

Access Management Quiz

12th Grade

60 Qs

67 Question Sec+ Quiz

67 Question Sec+ Quiz

Assessment

Quiz

Other

12th Grade

Easy

Created by

steven bair

Used 2+ times

FREE Resource

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes the CIA Triad?

Confidentiality, Integrity, Authentication

Confidentiality, Integrity, Availability

Control, Integrity, Availability

Compliance, Integrity, Authentication

Answer explanation

The CIA Triad stands for Confidentiality, Integrity, and Availability. These three principles are essential for ensuring the security and reliability of information systems, making this the correct choice.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary function of a firewall?

Encrypting sensitive data

Blocking unauthorized access while permitting legitimate communication

Detecting and removing malware

Managing user authentication

Answer explanation

The primary function of a firewall is to block unauthorized access while permitting legitimate communication, ensuring network security by controlling incoming and outgoing traffic.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which attack involves an attacker intercepting and modifying communications between two parties?

Man-in-the-Middle (MitM)

Phishing

Denial-of-Service (DoS)

SQL Injection

Answer explanation

The Man-in-the-Middle (MitM) attack occurs when an attacker secretly intercepts and alters the communication between two parties, making it the correct choice. Other options like phishing, DoS, and SQL injection do not involve this type of interception.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of multi-factor authentication (MFA)?

To require users to answer multiple security questions

To ensure users reset their passwords regularly

To provide an additional layer of security by requiring two or more authentication factors

To replace password-based authentication

Answer explanation

The correct choice highlights that multi-factor authentication (MFA) adds an extra layer of security by requiring two or more authentication factors, making it harder for unauthorized users to gain access.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a physical security control?

Antivirus software

Firewall

Security badge access

Password policy

Answer explanation

Security badge access is a physical security control that restricts access to facilities. In contrast, antivirus software, firewalls, and password policies are examples of logical security controls.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of malware disguises itself as legitimate software to trick users into installing it?

Worm

Trojan Horse

Rootkit

Ransomware

Answer explanation

A Trojan Horse is a type of malware that pretends to be legitimate software, tricking users into installing it. Unlike worms or ransomware, it relies on user action to spread and execute.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security measure is commonly used to prevent brute-force attacks?

Account lockout policy

Antivirus software

Content filtering

Network segmentation

Answer explanation

An account lockout policy is designed to prevent brute-force attacks by temporarily locking accounts after a certain number of failed login attempts, thereby thwarting unauthorized access attempts.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?