Security Principles and Controls Quiz

Security Principles and Controls Quiz

University

30 Qs

quiz-placeholder

Similar activities

Special Procedures

Special Procedures

University

25 Qs

แบบทดสอบ IoT

แบบทดสอบ IoT

University

25 Qs

Information Systems Test 1

Information Systems Test 1

12th Grade - University

25 Qs

United Nations_Int.Org_2024A

United Nations_Int.Org_2024A

University

28 Qs

Logistics Environment I & II - Security

Logistics Environment I & II - Security

9th Grade - Professional Development

35 Qs

Risk Management - Midterms LQ

Risk Management - Midterms LQ

University

25 Qs

(Part 2) Modules 10 – 13: L2 Security and WLANs

(Part 2) Modules 10 – 13: L2 Security and WLANs

University

30 Qs

Security Analyst

Security Analyst

University

25 Qs

Security Principles and Controls Quiz

Security Principles and Controls Quiz

Assessment

Quiz

Other

University

Hard

Created by

Nate undefined

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have excellent technical acumen. Part of your responsibilities where you work include overlooking daily operations as well as analyzing and designing security solutions in a specific area. You encounter a situation that needs to be escalated. Which of the following are you most likely to approach with the situation?

CIO

CISO

Security manager

Security administrator

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When analyzing a security breach, Acer determines the attacker was able to change the price of an item from $200 to $20. What security protection was compromised?

Confidentiality

Integrity

Authorization

Authentication

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A visitor is trying to access a military base. The visitor needs to supply their license and enter other personal information via a kiosk. The visitor is eventually allowed to enter the base but is limited to certain areas only. What security principles are being employed? Select two.

Authentication

Authorization

Confidentiality

Accounting

Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes what Della could do to prevent unauthorized parties from viewing sensitive customer information at her retail store?

Use software to encrypt data in a secure database.

Verify the ID of the party requesting access to the data.

Limit access to certain areas once access is granted.

Ensure the data cannot be manipulated or changed.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Evin thinks one of the computer systems where he works may have been compromised. He does not currently have a good way of determining if an unauthorized user logged in successfully. Which of the following can Evin implement that will, going forward, help him identify who logs in?

Authentication

Authorization

Availability

Accounting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A friend gets a virus and asks if you can help them fix the problem. You boot the computer with a bootable flash drive containing security-related tools and remove the virus. What type of control did you employ?

Deterrent

Corrective

Directive

Compensating

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As a consultant, you are asked by a company to help them work on a security-related project that falls under the operational control scope. Which of the following will you help implement?

Define an acceptable use policy

Install a card reader to access the data center

Install hardware to block malicious content

Implement security awareness training

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?