SYO 701 INTRO TO SECURITY Module FC-2

SYO 701 INTRO TO SECURITY Module FC-2

University

20 Qs

quiz-placeholder

Similar activities

ICT Unit-2

ICT Unit-2

University

20 Qs

Computer Security Measure

Computer Security Measure

11th Grade - University

19 Qs

2.3.1 Graph Traversal & Path Finding Algorithms

2.3.1 Graph Traversal & Path Finding Algorithms

12th Grade - University

20 Qs

MEDIDAS DE TENDENCIA CENTRAL

MEDIDAS DE TENDENCIA CENTRAL

University

20 Qs

Assignment 7 - Looping

Assignment 7 - Looping

University

16 Qs

Práctica Informática Básica

Práctica Informática Básica

University

16 Qs

Arquitetura de Software - Arquitetura Cliente-Servidor

Arquitetura de Software - Arquitetura Cliente-Servidor

University

15 Qs

SYO 701 INTRO TO SECURITY Module FC-2

SYO 701 INTRO TO SECURITY Module FC-2

Assessment

Quiz

Computers

University

Hard

Created by

Wayground Content

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

239. To improve the security at a data center, a security administrator implements a CCTV system and posts several signs about the possibility of being filmed. Which of the following best describe these types of controls? (Choose two)

A. Preventive

B. Deterrent

C. Corrective

D. Detective

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

267. Which of the following is a possible factor for MFA?

A. Something you know

B. Something you have

C. Something you are

D. Something you do

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

215. A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers over a few of the links within the email and discovers that the links do not correspond to links associated with the company. Which of the following attack vectors is most likely being used?

A. Business email

B. Phishing

C. Spoofing

D. Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

158. A security analyst is reviewing the following logs:

Which of the following attacks is most likely occurring?

A. Password spraying

B. SQL injection

C. Cross-site scripting

D. Denial of service

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

157. A systems administrator wants to prevent users from being able to access data based on their responsibilities. The administrator also wants to apply the required access structure via a simplified format. Which of the following should the administrator apply to the site recovery resource group?

A. RBAC

B. ACL

C. IAM

D. SSO

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

200. A company is redesigning its infrastructure and wants to reduce the number of physical servers in use. Which of the following architectures is best suited for this goal?

A. Cloud Computing

B. Traditional Hosting

C. Virtualization

D. Dedicated Servers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

213. Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?

A. Integrity

B. Confidentiality

C. Availability

D. Authentication

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?