Search Header Logo

Week 1 review Sec+

Authored by Connor Hach

Computers

Professional Development

Used 1+ times

Week 1 review Sec+
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization has set up an intrusion detection system (IDS) to monitor network traffic for suspicious activity and alert the security team in case of a potential threat. This system is an example of which type of security control?


Technical, Detective

Physical, Deterrent

Operational, Corrective

Managerial, Directive

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A government agency is upgrading its physical security measures to safeguard its premises from unauthorized entry. They plan to install security guards, access control vestibules, and bollards. Which security concept best describes their approach to controlling physical access to their facilities?

Zero Trust

Deception and Disruption technology

Authentication

Physical Security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An IT department is rolling out a new version of software used across multiple departments. During the change management process, they identify that the new software version is incompatible with an older application that one department relies on. What aspect of the change management process did they likely overlook?


Approval process

Impact analysis

Documentation

Maintenance window

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a routine security audit, the IT team discovers gaps in log monitoring and reporting. Which tool or technology can the team implement to address this issue effectively?

SIEM

Antivirus software

Vulnerability scanner

Data loss prevention (DLP)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company's sensitive data was stolen by a highly sophisticated group that appeared to be well-funded and had access to advanced tools and techniques. This group was later identified as working on behalf of a foreign government. Which type of threat actor is responsible for this attack?


Hacktivist

Insider threat

Organized-crime

Nation-state

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A disgruntled employee intentionally leaked confidential company information to the public after being passed over for a promotion. What type of threat actor does this scenario describe?


Hacktivist

Insider threat

Unskilled attacker

Organized crime

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A large financial institution experiences a coordinated attack on its systems, resulting in a significant loss of customer data. The attackers demand a ransom to stop further attacks and to return the stolen data. Which motivation aligns with this scenario?


Philosophical/political beliefs

Disruption/chaos

Financial gain

Ethical

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?