PART2

PART2

Professional Development

50 Qs

quiz-placeholder

Similar activities

CUESTIONARIO REPASO COMPLETO BASTIONADO DE REDES

CUESTIONARIO REPASO COMPLETO BASTIONADO DE REDES

Professional Development

50 Qs

Cuestionario Web

Cuestionario Web

Professional Development

50 Qs

Loop in C

Loop in C

Professional Development

51 Qs

HTML And CSS

HTML And CSS

4th Grade - Professional Development

53 Qs

POSTEST TCC-GC 2 - SGSI

POSTEST TCC-GC 2 - SGSI

1st Grade - Professional Development

50 Qs

CC-IAT2 QUIZ

CC-IAT2 QUIZ

Professional Development

50 Qs

2ºDAW - Diseño de Interfaces Web - Trim.2 - Prof. C. Boni

2ºDAW - Diseño de Interfaces Web - Trim.2 - Prof. C. Boni

University - Professional Development

50 Qs

Health and safety

Health and safety

Professional Development

50 Qs

PART2

PART2

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Ayomide Oluwaga

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the event of a disaster, what should be the PRIMARY objective?

Apply disaster communication

Protect the production database

Guarantee the safety of people

Guarantee the continuity of critical systems

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security professional should report violations of a company's security policy to:

The ISC Ethics Committee

Company management

National authorities

A court of law

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which department in a company is NOT regularly involved in a DRP?

Executives

IT

Public Relations

Financial

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is included in an SLA document?

A plan to prepare the organization for the continuation of critical business functions

A plan to keep business operations going while recovering from a significant disruption

Instructions to detect, respond to, and limit the consequences of a cyber-attack

Instructions on data ownership and destruction

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most important difference between MAC and DAC?

In MAC, security administrators set the roles for the users; in DAC, roles are set at the object owner’s discretion

In MAC, security administrators assign access permissions; in DAC, security administrators set user roles

In MAC, security administrators assign access permissions; in DAC, access permissions are set at the object owner’s discretion

In MAC, access permissions are set at the object owner’s discretion; in DAC, it is up to security administrators to assign access permissions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Requiring a specific user role to access resources is an example of:

MAC

ABAC

RBAC

DAC

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of document outlines the procedures ensuring that vital company systems keep running during business disrupting events?

Business Impact Plan

Business Impact Analysis

Disaster Recovery Plan

Business Continuity Plan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?