

5.1 Security+ Knowledge Assessment Flashcard
Flashcard
•
Instructional Technology
•
Vocational training
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

24 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which access control model is based on the concept of least privilege and separation of duties? Options: Discretionary Access Control (DAC), Role-Based Access Control (RBAC), Mandatory Access Control (MAC), Attribute-Based Access Control (ABAC)
Back
Role-Based Access Control (RBAC)
Answer explanation
Role-Based Access Control (RBAC) is designed around the principles of least privilege and separation of duties, ensuring users have only the access necessary for their roles, thus enhancing security.
2.
FLASHCARD QUESTION
Front
Which network security protocol is primarily used to secure web traffic over the Internet?
Back
HTTPS
Answer explanation
HTTPS (Hypertext Transfer Protocol Secure) is the protocol used to secure web traffic over the Internet by encrypting data between the user's browser and the web server, ensuring privacy and data integrity.
3.
FLASHCARD QUESTION
Front
During which phase of the incident response process is evidence collected and preserved? Options: Preparation, Detection and Analysis, Containment, Eradication, and Recovery, Post-Incident Activity
Back
Containment, Eradication, and Recovery
Answer explanation
During the Containment, Eradication, and Recovery phase, evidence is collected and preserved to understand the incident and prevent future occurrences. This is crucial for effective incident response.
4.
FLASHCARD QUESTION
Front
Which of the following is a qualitative risk management strategy? Risk Avoidance, Risk Quantification, Risk Mitigation, Risk Transfer
Back
Risk Avoidance
Answer explanation
Risk Avoidance is a qualitative risk management strategy that involves eliminating the risk entirely, rather than trying to manage or transfer it. The other options focus on quantifying or mitigating risks, which are not qualitative.
5.
FLASHCARD QUESTION
Front
Which encryption technique uses two different keys for encryption and decryption?
Back
Asymmetric Encryption
Answer explanation
Asymmetric Encryption uses two different keys: a public key for encryption and a private key for decryption. This contrasts with Symmetric Encryption, which uses the same key for both processes.
6.
FLASHCARD QUESTION
Front
Which of the following is an example of a security policy? Firewall Configuration, Password Policy, Network Topology, Data Backup Schedule
Back
Password Policy
Answer explanation
A Password Policy is a security policy that defines rules for creating and managing passwords, ensuring security. In contrast, Firewall Configuration, Network Topology, and Data Backup Schedule are not classified as security policies.
7.
FLASHCARD QUESTION
Front
In the context of access control models, what does the principle of "separation of duties" aim to prevent?
Back
Conflict of interest
Answer explanation
The principle of 'separation of duties' aims to prevent conflict of interest by ensuring that no single individual has control over all aspects of a transaction, thereby reducing the risk of fraud and errors.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Filing Systems and Folder Types
Flashcard
•
KG - University
22 questions
Spanish Vocabulary Flashcards
Flashcard
•
12th Grade - University
19 questions
Access Control Methods
Flashcard
•
KG - University
13 questions
Job Roles and Responsibilities in the Automotive Industry
Flashcard
•
Professional Development
15 questions
Archival Principles and Values
Flashcard
•
KG
20 questions
Conceptos Clave de Gestión Empresarial
Flashcard
•
Professional Development
17 questions
Vocabulary Flashcards
Flashcard
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade