56. Mitigation Techniques

56. Mitigation Techniques

Assessment

Interactive Video

Professional Development

Professional Development

Easy

Created by

Jennifer Clark

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary benefit of patching known vulnerabilities?

It improves the user interface.

It increases the storage capacity.

It reduces the impact of potential security events.

It makes the system faster.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption method is integrated into the Windows operating system for file-level encryption?

EFS

FileVault

AES

BitLocker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of full disk encryption (FDE)?

To encrypt only user files.

To encrypt everything on the storage volume.

To encrypt only the operating system.

To encrypt network traffic.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of least privilege?

Disabling all user permissions.

Giving users maximum permissions.

Assigning rights and permissions based on job roles.

Allowing all users to have administrative access.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be done with storage drives before decommissioning equipment?

Encrypt them again.

Leave them as they are.

Remove or delete all information from them.

Sell them without any changes.

Discover more resources for Professional Development