
Choloe
Authored by Vernice Gaylor
Other
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
101 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the PRIMARY purpose of installing a mantrap within a facility?
Control traffic
Prevent rapid movement
|Prevent piggybacking
Control air flow
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of the following controls in place?
Whitelisting application
Network segmentation
Hardened configuration
Blacklisting application
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?
File Integrity Checker
Security information and event management (SIEM) system
Audit Logs
Intrusion detection system (IDS)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization with divisions in the United States (US) and the United Kingdom (UK) processes data comprised of personal information belonging to subjects living in the
European Union (EU) and in the US. Which data MUST be handled according to the privacy protections of General Data Protection Regulation (GDPR)?
Only the EU citizens’ data
Only the EU residents’ data
Only the UK citizens' data
Only data processed in the UK
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following has the responsibility of information technology (IT) governance?
Chief Information Officer (CIO)
Senior IT Management
Board of Directors
Chief Information Security Officer (CISO)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Dumpster diving is a technique used in which stage of penetration testing methodology?
Attack
Discovery
Reporting
Planning
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the MOST common cause of Remote Desktop Protocol (RDP) compromise?
Brute force attack
POrt Scan
Remote Exploit
Social Engineering
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
100 questions
Radio Wave Propagation Quiz - ELEMENT V
Quiz
•
12th Grade
97 questions
Relationship Between Hardware and Software
Quiz
•
12th Grade
100 questions
FBLA Cybersecurity Quiz
Quiz
•
12th Grade
100 questions
Quiz PTS XII TKJ Ganjil 24
Quiz
•
12th Grade
101 questions
sầu riêng
Quiz
•
12th Grade
100 questions
Orenda E-Sports CSGO Callouts
Quiz
•
KG - Professional Dev...
97 questions
Study Guide Quiz (MM)
Quiz
•
12th Grade
100 questions
Engineering Technology I Final 2021
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Other
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
22 questions
El Imperfecto
Quiz
•
9th - 12th Grade
25 questions
Logos
Quiz
•
12th Grade
20 questions
Grammar
Quiz
•
9th - 12th Grade
18 questions
Mendelian Genetics
Quiz
•
10th - 12th Grade
22 questions
Regular Preterite -AR-ER-IR-
Quiz
•
12th Grade
20 questions
verbos reflexivos en español
Quiz
•
9th - 12th Grade
14 questions
Making Inferences From Samples
Quiz
•
7th - 12th Grade