SYO 701 INTRO TO SECURITY Module FC-2

Quiz
•
Computers
•
University
•
Hard
Wayground Content
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
239. To improve the security at a data center, a security administrator implements a CCTV system and posts several signs about the possibility of being filmed. Which of the following best describe these types of controls? (Choose two)
A. Preventive
B. Deterrent
C. Corrective
D. Detective
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
267. Which of the following is a possible factor for MFA?
A. Something you know
B. Something you have
C. Something you are
D. Something you do
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
215. A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers over a few of the links within the email and discovers that the links do not correspond to links associated with the company. Which of the following attack vectors is most likely being used?
A. Business email
B. Phishing
C. Spoofing
D. Malware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
158. A security analyst is reviewing the following logs:
Which of the following attacks is most likely occurring?
A. Password spraying
B. SQL injection
C. Cross-site scripting
D. Denial of service
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
157. A systems administrator wants to prevent users from being able to access data based on their responsibilities. The administrator also wants to apply the required access structure via a simplified format. Which of the following should the administrator apply to the site recovery resource group?
A. RBAC
B. ACL
C. IAM
D. SSO
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
200. A company is redesigning its infrastructure and wants to reduce the number of physical servers in use. Which of the following architectures is best suited for this goal?
A. Cloud Computing
B. Traditional Hosting
C. Virtualization
D. Dedicated Servers
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
213. Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?
A. Integrity
B. Confidentiality
C. Availability
D. Authentication
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Mikrotik Dasar

Quiz
•
12th Grade - University
15 questions
Mastering Physical Security Concepts

Quiz
•
12th Grade - University
18 questions
Cyber EOP - Security Policies By Mr. B

Quiz
•
12th Grade - University
18 questions
Computer Quiz

Quiz
•
University
20 questions
Database Management Systems Unit I Quiz

Quiz
•
University
22 questions
last22

Quiz
•
University
20 questions
Buffer Overflows - CompTIA Security+ SY0-701 - 2.3

Quiz
•
9th Grade - University
15 questions
Living in the IT Era - Q1

Quiz
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
7 questions
Common and Proper Nouns

Interactive video
•
4th Grade - University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University
7 questions
PC: Unit 1 Quiz Review

Quiz
•
11th Grade - University
7 questions
Supporting the Main Idea –Informational

Interactive video
•
4th Grade - University
12 questions
Hurricane or Tornado

Quiz
•
3rd Grade - University
7 questions
Enzymes (Updated)

Interactive video
•
11th Grade - University