CompTIA Security + (Part 1)

CompTIA Security + (Part 1)

12th Grade

20 Qs

quiz-placeholder

Similar activities

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

12th Grade

23 Qs

PRETEST

PRETEST

12th Grade

15 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Linux - Unit 8 Quiz

Linux - Unit 8 Quiz

9th - 12th Grade

20 Qs

Security Domain

Security Domain

9th - 12th Grade

20 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

Cisco Level 3 Modules 7 - 8

Cisco Level 3 Modules 7 - 8

12th Grade

15 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

CompTIA Security + (Part 1)

CompTIA Security + (Part 1)

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Quizizz Content

Used 7+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company's IT department considers different approaches to obtaining digital certificates for its internal network infrastructure. The IT department evaluated the use of a Certificate Signing Request (CSR) and third-party Certificate Authorities (CAs) to meet their security requirements. What is the primary advantage of using a CSR and a third-party CA for obtaining digital certificates compared to other methods?

Using a Certificate Signing Request and a third-party Certificate Authority allows for faster deployment of digital certificates within the network.

Using a Certificate Signing Request and a third-party Certificate Authority eliminates the need for regular certificate renewals and maintenance.

Digital certificates obtained through a Certificate Signing Request and a third-party Certificate Authority provide stronger encryption algorithms and key lengths.

Digital certificates obtained through a Certificate Signing Request and a third-party Certificate Authority have a higher level of trust and recognition within the industry.

Answer explanation

Digital certificates from a CSR and third-party CA are widely recognized and trusted, enhancing security and credibility within the industry compared to self-signed certificates or internal CAs.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An educational institution plans to transition from a traditional to a digital learning system. The school's administration has assembled a Change Management Board (CMB) to ensure smooth and secure execution. Within the scope of this educational institution's digital transformation project, what would be the primary role of the CMB?

Overseeing the daily operations of the school's IT department

      

 

Conducting cybersecurity awareness training for all school staff

Assessing, approving, and managing changes in the IT infrastructure

Developing and implementing the school's digital learning curriculum

Answer explanation

The primary role of the Change Management Board (CMB) is to assess, approve, and manage changes in the IT infrastructure, ensuring a smooth transition to the digital learning system.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An educational institution plans to transition from a traditional to a digital learning system. The school's administration has assembled a Change Management Board (CMB) to ensure smooth and secure execution. Within the scope of this educational institution's digital transformation project, what would be the primary role of the CMB?

Overseeing the daily operations of the school's IT department

Conducting cybersecurity awareness training for all school staff

Assessing, approving, and managing changes in the IT infrastructure

Developing and implementing the school's digital learning curriculum

Answer explanation

The primary role of the Change Management Board (CMB) is to assess, approve, and manage changes in the IT infrastructure, ensuring a smooth transition to the digital learning system.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A global e-commerce company faces challenges with its legacy monolithic application. The application is becoming increasingly difficult to maintain due to its intertwined components and struggles to scale quickly enough to handle sudden traffic surges during big sales events. The company has already invested in cloud technology and on-premises infrastructure but still faces scalability and manageability issues. What would MOST effectively address these challenges?

    

Virtualization

Serverless infrastructure

Microservices

Embedded systems

Answer explanation

Microservices effectively address the challenges of a monolithic application by breaking it into smaller, manageable components. This architecture enhances scalability and maintainability, allowing the company to handle traffic surges more efficiently.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Experts at a scientific facility suspect that operatives from another government entity planted malware and are spying on one of their top secret systems. Which attacker type is likely responsible based on the attacker's location and likely goals?

Criminal syndicates 

State actors

Hacktivists

Unskilled attackers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber group is reviewing its web filtering capabilities after a recent breach. Which centralized web-filtering technique groups websites into categories such as social networking, gambling, and webmail?

 Content categorization

Block rules

Uniform resource locators (URL) scanning

Reputation-based filtering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization wants to enhance its cybersecurity by implementing web filtering. The company needs a solution that provides granular control over web traffic, ensures policy enforcement even when employees are off the corporate network, and can log and analyze Internet usage patterns. Which of the following strategies BEST meets these requirements?

    

Manual uniform resource locators (URLs) blocking

 

Centralized web filtering

Agent-based filtering

Reputation-based filtering

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?