
Security Plus 701 Mega Challenge 1
Authored by Prem Jadhwani
Professional Development
Professional Development
15 Questions
Used 49+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
1.
MATCH QUESTION
2 mins • 1 pt
Match the Mobile Device Terms to their Respective Definitions.
MDM
Company purchases and issues device that can be used for business and for personal use.
CYOD
Employee brings any device that they own and can use it for business and personal use.
BYOD
Company purchases and issues device that can only be used for business purposes.
COPE
A Software that is installed on a mobile device that gives a company control over corporate data stored on the device.
COBO
Employee chooses a device from a list of acceptable devices published by the company.
2.
MATCH QUESTION
2 mins • 1 pt
Match the following terms to their definitions.
Jailbreaking
A technology we can use to keep all data on a mobile device safe in the event that it is stolen or lost.
Remote Wipe
A system that can be used to scan mobile devices for health conditions before it connects to a network.
FDE
Removing the software restrictions from a mobile device.
Sideloading
Installing unverified software onto a mobile device that would typically be restricted.
NAC
A command a company can send to an employee device to remove corporate data.
3.
MATCH QUESTION
2 mins • 1 pt
Match the Access Control Models to the correct Pointer Word.
ABAC
Access Control rights are determined security labels and security levels.
RBAC
Access Control rights are at the discretion of a human.
RuBAC
Access Control rights are determined by a set of rules and mandates.
DAC
Access Control rights are determined by several varying factors and properties.
MAC
Access Control rights are determined by an employees position or title.
4.
MATCH QUESTION
2 mins • 1 pt
Match the following Account Controls to the correct definitions.
Least Privilege
Ensures users are using more than one way to authenticate, increasing security.
MFA
Ensures users have only the accesses needed to perform their job.
Impossible Travel Time (ITT)
Manages domain admin accounts by limiting permissions, and prevents Pass-the-Hash Attack.
Account Lockout
A configuration that will check the geographic distance between two account logins.
PAM
A setting that will lock an account after an action.
5.
MATCH QUESTION
2 mins • 1 pt
Match the following terms with the most appropriate definition.
Microservices
The benefits of this architecture include enhanced scalability and compartmentalization.
Jump Server
Term for a piece of equipment that is no longer receiving patch updates or support from the manufacturer.
Cloud-Native
Best option for giving a contractor secure access to an internal system.
EOL
This automates infrastructure deployment using code, making server provisioning faster.
IaC
Best architecture to use for maximum redundancy for critical systems.
6.
MATCH QUESTION
2 mins • 1 pt
Match the correct terms to the appropriate definitions.
Data-in-Transit
The process of verifying that all data has actually been removed from a device.
Sanitization
Data that is actively being transmitted between two points.
Data-in-Use
Data that is being processed by a program or application.
Certification
Removing data from drives in a repeatable manner. Helps prevent data recovery by hackers.
Data-at-Rest
Data that is being stored, or has been archived.
7.
MATCH QUESTION
2 mins • 1 pt
Match the following.
Data Masking
Best way to protect data being transmitted over the internet.
Data Protection Officer
Keeps a data inventory of all data that our company collects.
Encryption
Best way to protect credit card data in a testing environment using obfuscation.
Data tokenization
The process of identifying what data falls into what categories.
Data Classification
Best way to protect credit card data that is being stored in a database from theft.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
0 questions
make up time sec+ day 9
Quiz
•
0 questions
Security+ Day 10
Quiz
•
0 questions
38. Mobile Device Security Quiz
Quiz
•
0 questions
Security+ Day 11
Quiz
•
0 questions
Ch 7 Review - Cybersecurity
Quiz
•
0 questions
Chapter 5 (fundamentals of Cybersecurity)
Quiz
•
0 questions
Quiz
•
0 questions
Mobile Devices
Quiz
•
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade