
CISSP Crash Course - Security in Systems
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a potential vulnerability in client-based systems?
Keystroke loggers
Firmware vulnerabilities
Mobile code execution
Network device vulnerabilities
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common threat to server-based systems?
Denial of service attacks
Keystroke logging
Firmware updates
Local cache attacks
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of database model uses a logical tree structure?
Relational database
Hierarchical data model
NoSQL database
Graph database
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the role of a primary key in a relational database?
To store data in a graph format
To uniquely identify a record
To store information in a document format
To enforce relationships between tables
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which component of industrial control systems allows human interaction with machines?
PLC
HMI
DCS
SCADA
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a cloud service model, who is responsible for security in a SaaS environment?
The software developer
The network administrator
The cloud service provider
The customer
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key advantage of cloud systems in terms of security?
Simplified user access
Increased physical security
Reduced data redundancy
Scalability and elasticity
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?