Sec+ 701 Final Review Quiz

Sec+ 701 Final Review Quiz

Professional Development

50 Qs

quiz-placeholder

Similar activities

KUIS PKK 2 (PERAKITAN PRODUK)

KUIS PKK 2 (PERAKITAN PRODUK)

KG - Professional Development

50 Qs

Kiểm tra giữa kỳ TIN HỌC lớp 6_THCS Nguyễn Trãi_01_21-22

Kiểm tra giữa kỳ TIN HỌC lớp 6_THCS Nguyễn Trãi_01_21-22

Professional Development

50 Qs

Położenie i granice Polski, przeszłość, góry i zlodowacenia

Położenie i granice Polski, przeszłość, góry i zlodowacenia

7th Grade - Professional Development

47 Qs

Robotic Process Automation by Chayan Bhattacharjee

Robotic Process Automation by Chayan Bhattacharjee

Professional Development

50 Qs

202508500003

202508500003

Professional Development

45 Qs

Az-900 Prep 2

Az-900 Prep 2

Professional Development

50 Qs

ULANGAN NILAI RAPOT KELAS XII

ULANGAN NILAI RAPOT KELAS XII

Professional Development

50 Qs

Davinci Resolve 17 Fusion 101

Davinci Resolve 17 Fusion 101

11th Grade - Professional Development

45 Qs

Sec+ 701 Final Review Quiz

Sec+ 701 Final Review Quiz

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

Patrick Hines

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is commonly used to securely transfer files over a network?

FTP

SFTP

Telnet

SMTP

Answer explanation

SFTP (Secure File Transfer Protocol) is designed to securely transfer files over a network, using encryption to protect data. In contrast, FTP is not secure, while Telnet and SMTP serve different purposes.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym CIA stand for in information security?

Confidentiality, Integrity, Availability

Control, Inspection, Authorization

Confidentiality, Inspection, Access

Control, Integrity, Authentication

Answer explanation

In information security, CIA stands for Confidentiality, Integrity, and Availability. These three principles are essential for protecting data and ensuring it is accessible only to authorized users.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a physical security control?

Firewall

Security badge

Antivirus software

Encryption

Answer explanation

A security badge is a physical security control used to restrict access to facilities. In contrast, a firewall, antivirus software, and encryption are all examples of logical or technical security controls.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model is based on predefined roles within an organization?

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

Rule-Based Access Control

Answer explanation

Role-Based Access Control (RBAC) assigns permissions based on predefined roles within an organization, making it easier to manage access rights compared to Discretionary Access Control (DAC) and Mandatory Access Control (MAC).

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a risk assessment in the risk management framework?

To eliminate all risks

To identify and evaluate potential threats and vulnerabilities

To create user accounts

To install security patches

Answer explanation

The primary purpose of a risk assessment is to identify and evaluate potential threats and vulnerabilities, enabling organizations to understand risks and implement appropriate controls.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic algorithm is classified as symmetric?

RSA

AES

ECC

DSA

Answer explanation

AES (Advanced Encryption Standard) is a symmetric cryptographic algorithm, meaning it uses the same key for both encryption and decryption. In contrast, RSA, ECC, and DSA are asymmetric algorithms that use key pairs.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which document outlines the acceptable use of organizational resources by employees?

Incident Response Plan

Acceptable Use Policy

Disaster Recovery Plan

Business Continuity Plan

Answer explanation

The Acceptable Use Policy defines how employees can use organizational resources, ensuring proper conduct and security. Other options like the Incident Response Plan and Disaster Recovery Plan focus on different aspects of organizational management.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?