Sec+3

Sec+3

University

20 Qs

quiz-placeholder

Similar activities

Database Chapter 1 Part 2

Database Chapter 1 Part 2

6th Grade - University

15 Qs

Chapter 6 DATABASE  Part 1

Chapter 6 DATABASE Part 1

University

15 Qs

DP 900 - pt 5

DP 900 - pt 5

University

22 Qs

Database and Security BTQuiz

Database and Security BTQuiz

University

15 Qs

Practice Questions DP 300

Practice Questions DP 300

University

25 Qs

Guess the CS Term!

Guess the CS Term!

University

20 Qs

Transport Layer Security

Transport Layer Security

University

20 Qs

Information Assurance Midterm Quiz

Information Assurance Midterm Quiz

University

15 Qs

Sec+3

Sec+3

Assessment

Quiz

Computers

University

Hard

Created by

Marco Lopez

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is developing a new video conferencing tool. They want to make sure that all video and audio data transmitted between participants are encrypted and protected from eavesdropping. Which type of encryption should the developers implement to achieve this?

Endpoint Encryption

Transport-layer encryption

Volume level encryption

Database-level EncryptionAccess Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a significant cybersecurity incident, ABC Tech revamped its incident response procedures. However, the documentation was not updated to reflect these changes. During a subsequent minor incident, there was confusion regarding the steps to be followed. Which of the following is the MOST direct implication of not updating the incident response documentation?

The company may have to invest in new cybersecurity tools

Stakeholders might lose trust in the company’s ability to handle incidents

Incident response might be inconsistent and less effective

ABC Tech may have to hire external consultants for incident response

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A financial organization is considering implementing a system that allows all users to view all transactions, but once a transaction is recorded, it cannot be altered or deleted. They want this transparency to foster trust among their users. Which of the following would best meet this requirement?

Digital Certificate

Open public ledger

Symmetric Encryption

Secure file transfer protocol

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is implementing a system to ensure that code released to production is both unaltered and approved by a specific team member. Which of the following cryptographic techniques should they implement?

Symmetric encryption of the code

Hashing the code with SHA-256

Encrypting the code with the team member's public key

Digital signature by team member

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has recently deployed an update to its CRM application. Post-update, users are experiencing connectivity issues. As a security administrator, which of the following steps should you take FIRST to address the connectivity problem without causing data loss?

Restart the application immediately

Disconnect all users and then restart the application

Validate the update's integrity and then restart the application

Reinstall the previous version of the CRM application

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TechDynamics, a growing tech startup, plans to scale its operations and serve a global clientele. Given that their client base operates in multiple time zones, when should TechDynamics schedule their system maintenance to ensure minimal disruption?

During the busiest hours for their headquarters' local time

Staggered based on the peak hours of their global clients

Only when a system breakdown occurs

Establish a consistent maintenance window during off-peak hours for the majority of their clientele

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During an IT audit, a company’s encryption practices come under scrutiny. The IT auditor recommends increasing the encryption key length for certain applications to improve security. What is the PRIMARY reason to increase the encryption key length?

To speed up encryption and decryption processes

To ensure compatibility with older systems

To reduce the possibility of a brute force attack

To reduce the key management overhead

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?