Search Header Logo

Section 1 Part 3

Authored by Sharif Jr

Other

University

Used 1+ times

Section 1 Part 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an automated process for creating user accounts also generates records of these actions in a main log, which aspect of access control is being performed?

Accounting

Authorization

Authentication

Identification

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Following a wireless network security incident, technicians separated the network access for internet-connected devices, visitors, and company users. Which Zero Trust strategy does this action align with?

Threat scope reduction

Policy-driven access control

Control Plane

Data Plane

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To defend against overwhelming traffic attacks, a business uses a service at its network border that redirects malicious traffic to a specialized cleaning facility. What kind of control is this?

Corrective

Detective

Compensating

Preventive

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A task for a software update includes the instruction that the program must be restarted afterwards. What technical consideration is this related to?

Legacy applications

Downtime

Service restart

Dependencies

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a mobile phone employs a protected hardware area to create temporary, single-use encryption keys for individual operations, what is this component called?

TPM

Hardware Security Module

Secure enclave

Key management system

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a network security setting stops all communication channels except for standard web traffic (ports 80 and 443), what kind of firewall policy is this?

Implicit deny

Explicit allow

Implicit allow

Explicit deny

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a finance application records the user and timestamp for each transaction, which security control principle is responsible for this?

Authorization

Accounting

Authentication

Identification

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?