Security+

Security+

Professional Development

21 Qs

quiz-placeholder

Similar activities

AKG 4

AKG 4

University - Professional Development

19 Qs

PTY 104 Piagets Theory of Cognitive Development

PTY 104 Piagets Theory of Cognitive Development

University - Professional Development

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

MOS Transistor quiz 1

MOS Transistor quiz 1

Professional Development

20 Qs

Test your knowledge on gender equality!

Test your knowledge on gender equality!

Professional Development

20 Qs

PRE-TEST TRANSFER PRICING

PRE-TEST TRANSFER PRICING

Professional Development

19 Qs

Cyber security

Cyber security

Professional Development

20 Qs

Security+

Security+

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Medium

Created by

Kerwin Vialva

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following describes a social engineering technique that seeks to exploit a person's sense of urgency?

A phishing email stating a cash settlement has been awarded but will expire soon

A smishing message stating a package is scheduled for pickup

A vishing call that requests a donation be made to a local charity

A SPIM notification claiming to be undercover law enforcement investigating a cybercrime

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A company is implementing a DLP solution on the file server. The file server has PII, financial information, and health information stored on it. Depending on what type of data that is hosted on the file server, the company wants different DLP rules assigned to the data. Which of the following should the company do to help accomplish this goal?

Classify the data

Mask the data

Assign the application owner

Perform a risk analysis.

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A company wants to simplify the certificate management process. The company has a single domain with several dozen subdomains, all of which are publicly accessible on the internet. Which of the following BEST describes the type of certificate the company should implement?

Subject alternative name

Wildcard

Self-signed

Domain validation

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following is an effective tool to stop or prevent the exfiltration of data from a network?

DLP

NIDS

TPM

FDE

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Several attempts have been made to pick the door lock of a secure facility. As a result, the security engineer has been assigned to implement a stronger preventative access control. Which of the following would BEST complete the engineer's assignment?

Installing and monitoring a camera facing the door

Replacing the traditional key with an RFID key

Setting motion-sensing lights to illuminate the door on activity

Surrounding the property with fencing and gates

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following can be used by a monitoring tool to compare values and detect password leaks without providing the actual credentials?

Hashing

Tokenization

Masking

Encryption

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A security engineer is building a file transfer solution to send files to a business partner. The users would like to drop off the files in a specific directory and have the server send the file to the business partner. The connection to the business partner is over the internet and needs to be secure. Which of the following can be used?

S/MIME

SSH

LDAPS

SRTP

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?