CompTIA Security + (Part 1)

CompTIA Security + (Part 1)

12th Grade

34 Qs

quiz-placeholder

Similar activities

Unit 6 Exam Part 2

Unit 6 Exam Part 2

12th Grade

33 Qs

Cyber II | M3 L7 | Cloud and Virtualization

Cyber II | M3 L7 | Cloud and Virtualization

12th Grade

33 Qs

BTEC DIT - A1 Modern Technologies

BTEC DIT - A1 Modern Technologies

10th - 12th Grade

32 Qs

Network Security

Network Security

12th Grade

33 Qs

year 12 Computer Networking 290724

year 12 Computer Networking 290724

12th Grade

30 Qs

J277 Networks

J277 Networks

12th Grade

34 Qs

DHC Server

DHC Server

12th Grade

29 Qs

CyberOps Chapter 24-25 Review

CyberOps Chapter 24-25 Review

9th - 12th Grade

32 Qs

CompTIA Security + (Part 1)

CompTIA Security + (Part 1)

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Naquai Roundtree

Used 3+ times

FREE Resource

34 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 3 pts

Upon receiving the findings from a recent inspection, a senior technician must identify the various parties needed to implement change management solutions. Based on those impacted by the change, who is a stakeholder within the change management spectrum? (Select the three best options.)

Project manager

 

 

Partners

Vendors

Change Advisory Board (CAB)

Answer explanation

The stakeholders in change management include those directly impacted. Partners, Vendors, and the Change Advisory Board (CAB) are essential as they provide support, resources, and guidance for implementing changes effectively.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A financial services company is decommissioning many servers that contain highly sensitive financial information. The company's data protection policy stipulates the need to use the MOST secure data destruction methods and comply with strict regulatory requirements. The company also has a significant environmental sustainability commitment and seeks to minimize waste wherever possible. What should the company's primary course of action be during this process?

Degaussing the servers, rendering the data irretrievable, followed by reselling or recycling the servers after certification

Overwriting the data on the servers multiple times, then disposing of the servers without any certification 

Incinerating the servers, as it's the most effective method of data destruction 

Storing the servers indefinitely in a secure location to avoid any risk of data leakage

Answer explanation

Degaussing effectively destroys data by demagnetizing the drives, ensuring irretrievability. This method aligns with the company's data protection policy and allows for environmentally responsible reselling or recycling after certification.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A group of threat actors disrupts the online services of an oil company due to their disagreement with the company's environmental policies. They believe their actions can force the company to change its practices. This type of threat actor is primarily driven by what kind of motivation?

Political/philosophical beliefs 

Espionage 

Financial gain 

Service disruption

Answer explanation

The threat actors are motivated by their political/philosophical beliefs regarding environmental policies, aiming to influence the company's practices through disruption.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An educational institution plans to transition from a traditional to a digital learning system. The school's administration has assembled a Change Management Board (CMB) to ensure smooth and secure execution. Within the scope of this educational institution's digital transformation project, what would be the primary role of the CMB?

Overseeing the daily operations of the school's IT department

Conducting cybersecurity awareness training for all school staff

Assessing, approving, and managing changes in the IT infrastructure

Developing and implementing the school's digital learning curriculum

Answer explanation

The primary role of the Change Management Board (CMB) is to assess, approve, and manage changes in the IT infrastructure, ensuring a smooth transition to the digital learning system.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An educational institution plans to transition from a traditional to a digital learning system. The school's administration has assembled a Change Management Board (CMB) to ensure smooth and secure execution. Within the scope of this educational institution's digital transformation project, what would be the primary role of the CMB?

Overseeing the daily operations of the school's IT department

      

 

Conducting cybersecurity awareness training for all school staff

Assessing, approving, and managing changes in the IT infrastructure

Developing and implementing the school's digital learning curriculum

Answer explanation

The primary role of the Change Management Board (CMB) is to assess, approve, and manage changes in the IT infrastructure, ensuring a smooth transition to the digital learning system.

6.

MULTIPLE SELECT QUESTION

1 min • 3 pts

A system administrator implemented encryption across the organization's IT infrastructure. The infrastructure includes various types of data storage methods. Which of the following data storage methods can the system administrator encrypt to increase the security of data at rest? (Select the three best options.)

Volume

User interface

Partition

File

Answer explanation

Encrypting data at rest is crucial for security. The best options are Volume, Partition, and File, as these represent different storage methods that can be encrypted to protect sensitive information effectively.

7.

MULTIPLE SELECT QUESTION

1 min • 2 pts

A system admin is reviewing the company's environmental variables as there have been several new additions to workstations and servers. One of the primary environmental factors is the organization's IT infrastructure. What are two other environmental factors? (Select the two best options.)

Risk tolerance

 

 

 

 

External threat landscape

Prioritization

Regulatory/compliance environment

Answer explanation

The external threat landscape refers to potential risks from outside the organization, while the regulatory/compliance environment encompasses laws and regulations that the organization must adhere to, both crucial for IT infrastructure.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?