
CompTIA Security (Security and Risk Fundamentals)
Authored by Miftah Rahman
Computers, Professional Development
Professional Development
Used 18+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Any condition that leaves a device open to harm is a terminology of ...
Vulnerabilities
Risk
Exploit
Threat
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Creating a security policy is ... type of control
Prevention
Detection
Deterrence
Correction
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
using encryption is one of ... implementation
Confidentiality
Integrity
Availability
Authenticity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which authentication types that using fingerprint
something you are
something you know
something you have
somewhere you are
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should encoded and unreadable data be called?
decode text
cipher text
secret text
clear text
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hiring IT vendor to help organization business process is is type of which risk control?
Transfer Risk
Avoid Risk
Reduce Risk
Accept Risk
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Company decide to do some security training in order to harden their security infrastructure, which type of control is this method?
Technical Control
Management Control
Operational Control
Damage Control
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?