Lesson 10

Lesson 10

University

25 Qs

quiz-placeholder

Similar activities

2025-26-1S-COGNATES3-IST3-MQ7

2025-26-1S-COGNATES3-IST3-MQ7

University

25 Qs

M.Sc Class Test 4

M.Sc Class Test 4

University

20 Qs

Final Quiz

Final Quiz

University

20 Qs

Ethical Hacking

Ethical Hacking

University

20 Qs

Comptia network plus

Comptia network plus

12th Grade - Professional Development

20 Qs

Basis Data dalam Rekam Medis

Basis Data dalam Rekam Medis

University

20 Qs

CHFI v9 - Module 8 Investigating Web Attacks

CHFI v9 - Module 8 Investigating Web Attacks

University

20 Qs

RC on Data Scence and Quantum Computing - Test

RC on Data Scence and Quantum Computing - Test

University

20 Qs

Lesson 10

Lesson 10

Assessment

Quiz

Other

University

Easy

Created by

Benjamin Fenton

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the purpose of device hardening for endpoints like laptops and desktops?

Deploying only legacy applications to reduce compatibility errors

Minimizing the attack surface by removing or disabling unneeded services and software

Installing as much software as possible to increase feature availability

Limiting user access to the internet to avoid performance problems

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security architect wants to ensure that every device connecting to the corporate network meets a standardized security checklist for configuration (for example, ensuring certain ports are closed, USB devices are disabled, etc.). Which of the following mechanisms is designed to verify and remediate deviations from that checklist?

Network segmentation

Baseline configuration and deviation reporting

Port mirroring

Encryption at rest

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is worried about malware spreading laterally between workstations. The security team configures VLANs so that devices in the finance department are isolated from those in the marketing department. Which of the following describes this security strategy?

Air gapping

Network segmentation

Zero-day containment

Virtual patching

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator wants to guarantee that malicious or unauthorized scripts cannot run on corporate endpoints. The organization decides to only permit scripts that are explicitly approved. Which of the following describes this approach?

Data loss prevention (DLP)

Allow (whitelist) execution policy

Mobile device management (MDM)

Block (blacklist) execution policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a benefit of full disk encryption (FDE) on a laptop?

It eliminates the need for password-based authentication.

It immediately blocks all incoming network connections by default.

It protects data if the device is lost or stolen.

It increases the speed of data access from the disk.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not typically managed by a mobile device management (MDM) solution?

Enforcing screen lock and passcode settings

Managing virtual machine operating system file permissions for server clusters

Tracking devices and enforcing remote wipes

Pushing application and OS updates to smartphones

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator notices that the host-based intrusion detection system (HIDS) on a server is alerting on unusual changes to a critical system file. Which of the following features is the HIDS most likely using?

A. File integrity monitoring (FIM)

B. Honeypot logs

C. Dynamic ARP inspection (DAI)

D. Certificate pinning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?