PART2

PART2

Professional Development

50 Qs

quiz-placeholder

Similar activities

Information Storage & Management Assessment (Set A)

Information Storage & Management Assessment (Set A)

Professional Development

50 Qs

Employbility skills

Employbility skills

Professional Development

50 Qs

AZ-900 Practice Test 3

AZ-900 Practice Test 3

Professional Development

51 Qs

Web Design (HTML + CSS)

Web Design (HTML + CSS)

Professional Development

54 Qs

Test Mendix 2

Test Mendix 2

Professional Development

50 Qs

HTML/CSS контрольный

HTML/CSS контрольный

Professional Development

50 Qs

Presentaciones de Google

Presentaciones de Google

KG - Professional Development

48 Qs

CUESTIONARIO DE REPASO DE HACKING ÉTICO

CUESTIONARIO DE REPASO DE HACKING ÉTICO

Professional Development

50 Qs

PART2

PART2

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Ayomide Oluwaga

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the event of a disaster, what should be the PRIMARY objective?

Apply disaster communication

Protect the production database

Guarantee the safety of people

Guarantee the continuity of critical systems

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security professional should report violations of a company's security policy to:

The ISC Ethics Committee

Company management

National authorities

A court of law

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which department in a company is NOT regularly involved in a DRP?

Executives

IT

Public Relations

Financial

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is included in an SLA document?

A plan to prepare the organization for the continuation of critical business functions

A plan to keep business operations going while recovering from a significant disruption

Instructions to detect, respond to, and limit the consequences of a cyber-attack

Instructions on data ownership and destruction

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most important difference between MAC and DAC?

In MAC, security administrators set the roles for the users; in DAC, roles are set at the object owner’s discretion

In MAC, security administrators assign access permissions; in DAC, security administrators set user roles

In MAC, security administrators assign access permissions; in DAC, access permissions are set at the object owner’s discretion

In MAC, access permissions are set at the object owner’s discretion; in DAC, it is up to security administrators to assign access permissions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Requiring a specific user role to access resources is an example of:

MAC

ABAC

RBAC

DAC

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of document outlines the procedures ensuring that vital company systems keep running during business disrupting events?

Business Impact Plan

Business Impact Analysis

Disaster Recovery Plan

Business Continuity Plan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?