Section 1 Part 3

Section 1 Part 3

University

14 Qs

quiz-placeholder

Similar activities

Social Networks

Social Networks

University

12 Qs

Module 2 Quiz

Module 2 Quiz

University

10 Qs

VANETS

VANETS

University

10 Qs

Wireless Channels and Communication

Wireless Channels and Communication

University

10 Qs

Introduction to  Computer organisation

Introduction to Computer organisation

University

15 Qs

It's QUIZ Time 12th March

It's QUIZ Time 12th March

KG - Professional Development

15 Qs

IR 4.0 Quiz

IR 4.0 Quiz

University

13 Qs

CCNA 20200303

CCNA 20200303

University

15 Qs

Section 1 Part 3

Section 1 Part 3

Assessment

Quiz

Other

University

Medium

Created by

Sharif Jr

Used 1+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an automated process for creating user accounts also generates records of these actions in a main log, which aspect of access control is being performed?

Accounting

Authorization

Authentication

Identification

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Following a wireless network security incident, technicians separated the network access for internet-connected devices, visitors, and company users. Which Zero Trust strategy does this action align with?

Threat scope reduction

Policy-driven access control

Control Plane

Data Plane

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To defend against overwhelming traffic attacks, a business uses a service at its network border that redirects malicious traffic to a specialized cleaning facility. What kind of control is this?

Corrective

Detective

Compensating

Preventive

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A task for a software update includes the instruction that the program must be restarted afterwards. What technical consideration is this related to?

Legacy applications

Downtime

Service restart

Dependencies

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a mobile phone employs a protected hardware area to create temporary, single-use encryption keys for individual operations, what is this component called?

TPM

Hardware Security Module

Secure enclave

Key management system

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a network security setting stops all communication channels except for standard web traffic (ports 80 and 443), what kind of firewall policy is this?

Implicit deny

Explicit allow

Implicit allow

Explicit deny

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a finance application records the user and timestamp for each transaction, which security control principle is responsible for this?

Authorization

Accounting

Authentication

Identification

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?