Sec+ 701 Final Review Quiz
Quiz
•
Computers
•
Professional Development
•
Easy
Patrick Hines
Used 1+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol is commonly used to securely transfer files over a network?
FTP
SFTP
Telnet
SMTP
Answer explanation
SFTP (Secure File Transfer Protocol) is designed to securely transfer files over a network, using encryption to protect data. In contrast, FTP is not secure, while Telnet and SMTP serve different purposes.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the acronym CIA stand for in information security?
Confidentiality, Integrity, Availability
Control, Inspection, Authorization
Confidentiality, Inspection, Access
Control, Integrity, Authentication
Answer explanation
In information security, CIA stands for Confidentiality, Integrity, and Availability. These three principles are essential for protecting data and ensuring it is accessible only to authorized users.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a physical security control?
Firewall
Security badge
Antivirus software
Encryption
Answer explanation
A security badge is a physical security control used to restrict access to facilities. In contrast, a firewall, antivirus software, and encryption are all examples of logical or technical security controls.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which access control model is based on predefined roles within an organization?
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Rule-Based Access Control
Answer explanation
Role-Based Access Control (RBAC) assigns permissions based on predefined roles within an organization, making it easier to manage access rights compared to Discretionary Access Control (DAC) and Mandatory Access Control (MAC).
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of a risk assessment in the risk management framework?
To eliminate all risks
To identify and evaluate potential threats and vulnerabilities
To create user accounts
To install security patches
Answer explanation
The primary purpose of a risk assessment is to identify and evaluate potential threats and vulnerabilities, enabling organizations to understand risks and implement appropriate controls.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which cryptographic algorithm is classified as symmetric?
RSA
AES
ECC
DSA
Answer explanation
AES (Advanced Encryption Standard) is a symmetric cryptographic algorithm, meaning it uses the same key for both encryption and decryption. In contrast, RSA, ECC, and DSA are asymmetric algorithms that use key pairs.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which document outlines the acceptable use of organizational resources by employees?
Incident Response Plan
Acceptable Use Policy
Disaster Recovery Plan
Business Continuity Plan
Answer explanation
The Acceptable Use Policy defines how employees can use organizational resources, ensuring proper conduct and security. Other options like the Incident Response Plan and Disaster Recovery Plan focus on different aspects of organizational management.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
50 questions
Test Mendix 4
Quiz
•
Professional Development
47 questions
MS 900 Review Exam
Quiz
•
Professional Development
46 questions
Was machen Sachen
Quiz
•
Professional Development
49 questions
1. Maszyny i urządzenia.
Quiz
•
Professional Development
50 questions
Kompetensi Keahlian TKJ
Quiz
•
Professional Development
55 questions
WP 11-15
Quiz
•
Professional Development
50 questions
Ujian TIK
Quiz
•
Professional Development
50 questions
TEST ADMIN J&T Express
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
20 questions
MINERS Core Values Quiz
Quiz
•
8th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade
10 questions
How to Email your Teacher
Quiz
•
Professional Development
15 questions
Order of Operations
Quiz
•
5th Grade
Discover more resources for Computers
10 questions
How to Email your Teacher
Quiz
•
Professional Development
21 questions
October 25
Quiz
•
Professional Development
10 questions
October Monthly Quiz
Quiz
•
Professional Development
20 questions
There is There are
Quiz
•
Professional Development
5 questions
SSUSH13
Interactive video
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
