
Security 4

Quiz
•
Other
•
University
•
Easy
Joe Smith
Used 3+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator is working on a project to deploy a load balancer in the company's cloud environment. Which of the following fundamental security requirements does this project fulfil?
Privacy
Integrity
Confidentiality
Availability
Answer explanation
Availability is the correct answer because deploying a load balancer enhances the availability of applications and services by distributing traffic, providing redundancy, and ensuring continued access to resources even in the event of server failures. This project directly supports the availability aspect of the security triad.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A systems administrator is changing the password policy within an enterprise environment and wants this update implemented on all systems as quickly as possible. Which of the following operating system security measures will the administrator most likely use?
Deploying PowerShell scripts
Pushing GPO update
Enabling PAP
Updating EDR profiles
Answer explanation
Group Policy Objects (GPOs) provides an infrastructure for centralized configuration management of the Windows operating system and applications that run on the operating system. GPOs are a collection of settings that define what a system will look like and how it will behave for a defined group of computers or users.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?
ARO
RTO
RPO
ALE
SLE
Answer explanation
ARO: Annual Rate of Occurrence
RTO: Recovery Time Objective
RPO: Recovery Point Objective
ALE: Annual Loss Expectancy
SLE: Single Loss Expectancy
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?
Key stretching
Tokenization
Data masking
Salting
Answer explanation
Salting is the correct answer because it involves adding a random string to a password before hashing to strengthen security. This technique effectively prevents precomputed hash attacks, making it a critical component of modern password protection strategies.
Salting is correct. Read the difference between Salting and Key Stretching on : https://library.mosse-institute.com/articles/2023/07/key-stretching-and-saltingm.html It explains a lot.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technician is deploying a new security camera. Which of the following should the technician do?
Configure the correct VLAN.
Perform a vulnerability scan.
Disable unnecessary ports.
Conduct a site survey.
Answer explanation
D. Conduct a site survey. Before deploying a new security camera, conducting a site survey is crucial. A site survey helps determine the optimal placement of the camera, assesses environmental factors, ensures there are no blind spots, and verifies that the camera will effectively cover the desired area. It also helps in planning for network connectivity, power supply, and other logistical considerations.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is experiencing a web services outage on the public network. The services are up and available but inaccessible. The network logs show a sudden increase in network traffic that is causing the outage. Which of the following attacks is the organization experiencing?
ARP poisoning
Brute force
Buffer overflow
DDoS
Answer explanation
DDoS is the correct answer because the sudden increase in network traffic leading to a web services outage is characteristic of a Distributed Denial of Service attack. This type of attack overwhelms the target's resources, making services inaccessible, even though they are still operational. DDoS attacks specifically aim to disrupt access by flooding the target with excessive traffic, matching the symptoms described in the scenario.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following threat actors is the most likely to be motivated by profit?
Hacktivist
Insider threat
Organized crime
Shadow IT
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
Giant Christmas Holiday Quiz.

Quiz
•
8th Grade - University
47 questions
Biological Psychology: Sensation and Perception

Quiz
•
University
50 questions
ESS2323 Developing Human Capital Test and Quiz

Quiz
•
University
53 questions
Water Sources Quiz

Quiz
•
University
55 questions
final exam study(drivers ed)

Quiz
•
10th Grade - Professi...
50 questions
ETHICS

Quiz
•
University
48 questions
Business Letters

Quiz
•
10th Grade - Professi...
50 questions
DENT 1041 Review TEST #2

Quiz
•
University
Popular Resources on Wayground
10 questions
SR&R 2025-2026 Practice Quiz

Quiz
•
6th - 8th Grade
30 questions
Review of Grade Level Rules WJH

Quiz
•
6th - 8th Grade
6 questions
PRIDE in the Hallways and Bathrooms

Lesson
•
12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
15 questions
Subtracting Integers

Quiz
•
7th Grade
Discover more resources for Other
15 questions
Let's Take a Poll...

Quiz
•
9th Grade - University
2 questions
Pronouncing Names Correctly

Quiz
•
University
34 questions
WH - Unit 2 Exam Review -B

Quiz
•
10th Grade - University
21 questions
Mapa países hispanohablantes

Quiz
•
1st Grade - University
10 questions
Transition Words

Quiz
•
University
5 questions
Theme

Interactive video
•
4th Grade - University
25 questions
Identifying Parts of Speech

Quiz
•
8th Grade - University
10 questions
Spanish Greetings and Goodbyes!

Lesson
•
6th Grade - University