
Server Security Quiz
Authored by Brian Wanjau
Other
Vocational training
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A web server hosting an e-commerce site suddenly becomes unresponsive to user requests. Initial investigation reveals no signs of data breach or alteration, but legitimate traffic cannot reach the site. Which core principle of the CIA triad is primarily compromised, and what is a key server-level measure to restore it?
Confidentiality; Implementing stronger encryption for customer data.
Integrity; Performing a full data backup and restore.
Availability; Implementing DDoS mitigation strategies and load balancing.
Confidentiality; Enforcing multi-factor authentication for all administrative access.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is setting up a new server room. They have a limited budget for initial physical security upgrades. Which of the following physical security weaknesses, if unaddressed, would pose the MOST immediate and direct threat to server *availability* due to environmental factors?
Lack of biometric scanners for server room entry, relying only on key locks.
Absence of a dedicated climate control system (air conditioning and humidity control).
Untidy cable management under the raised floor.
Server racks not being bolted to the floor in a non-seismic zone.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization's network is experiencing a flood of SYN packets directed at its primary web server, consuming its connection resources and preventing legitimate users from establishing sessions. Which network security control is specifically designed to *actively prevent* this type of attack from overwhelming the server?
A passive Intrusion Detection System (IDS) configured to alert on SYN floods.
A firewall configured with rules to only allow traffic on port 443 from known IP addresses.
An Intrusion Prevention System (IPS) with capabilities to identify and block SYN flood patterns.
Network segmentation isolating the web server in a DMZ.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A new Linux server has just been deployed with the default OS installation. To minimize its attack surface as a first practical OS hardening step, what should an administrator prioritize?
Immediately installing advanced antivirus and EDR solutions.
Configuring complex password policies and enabling multi-factor authentication.
Disabling all unnecessary services, ports, and installed applications not required for its specific role.
Implementing a comprehensive SIEM solution for log collection and analysis.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A web application hosted on a server is found to be vulnerable to SQL injection. User-supplied data from a search form is directly incorporated into database queries without sanitization. What is the most effective way to remediate this specific vulnerability?
Implementing a Web Application Firewall (WAF) to block known SQL injection patterns.
Encrypting all data stored in the database.
Modifying the application code to use parameterized queries or prepared statements for all database interactions.
Regularly patching the web server software and the underlying operating system.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization needs to ensure that sensitive customer PII stored in a database on their primary server is protected even if an unauthorized individual gains physical access to the server's hard drives after hours. Which data security strategy is most directly applicable to this specific threat?
Encryption in transit using TLS for all web communications.
Encryption at rest, such as full-disk encryption (FDE) or database-level encryption.
Implementing a Data Loss Prevention (DLP) solution to monitor data exfiltration.
Confidential Computing using Trusted Execution Environments (TEEs).
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A junior system administrator needs access to a specific server to perform daily log checks but should not have permissions to change configurations or install software. How can the Principle of Least Privilege (PoLP) be best applied in this scenario using IAM controls?
Granting the administrator full 'root' or 'administrator' access to the server, trusting them to only perform assigned tasks.
Creating a specific user account for the administrator with read-only access to log files and no other administrative rights.
Adding the administrator to a general 'IT Staff' group that has broad access to multiple servers and systems.
Allowing the administrator to use a shared administrative account that is monitored closely.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?