
Sec+3
Authored by Marco Lopez
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is developing a new video conferencing tool. They want to make sure that all video and audio data transmitted between participants are encrypted and protected from eavesdropping. Which type of encryption should the developers implement to achieve this?
Endpoint Encryption
Transport-layer encryption
Volume level encryption
Database-level EncryptionAccess Control
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After a significant cybersecurity incident, ABC Tech revamped its incident response procedures. However, the documentation was not updated to reflect these changes. During a subsequent minor incident, there was confusion regarding the steps to be followed. Which of the following is the MOST direct implication of not updating the incident response documentation?
The company may have to invest in new cybersecurity tools
Stakeholders might lose trust in the company’s ability to handle incidents
Incident response might be inconsistent and less effective
ABC Tech may have to hire external consultants for incident response
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A financial organization is considering implementing a system that allows all users to view all transactions, but once a transaction is recorded, it cannot be altered or deleted. They want this transparency to foster trust among their users. Which of the following would best meet this requirement?
Digital Certificate
Open public ledger
Symmetric Encryption
Secure file transfer protocol
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is implementing a system to ensure that code released to production is both unaltered and approved by a specific team member. Which of the following cryptographic techniques should they implement?
Symmetric encryption of the code
Hashing the code with SHA-256
Encrypting the code with the team member's public key
Digital signature by team member
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company has recently deployed an update to its CRM application. Post-update, users are experiencing connectivity issues. As a security administrator, which of the following steps should you take FIRST to address the connectivity problem without causing data loss?
Restart the application immediately
Disconnect all users and then restart the application
Validate the update's integrity and then restart the application
Reinstall the previous version of the CRM application
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
TechDynamics, a growing tech startup, plans to scale its operations and serve a global clientele. Given that their client base operates in multiple time zones, when should TechDynamics schedule their system maintenance to ensure minimal disruption?
During the busiest hours for their headquarters' local time
Staggered based on the peak hours of their global clients
Only when a system breakdown occurs
Establish a consistent maintenance window during off-peak hours for the majority of their clientele
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During an IT audit, a company’s encryption practices come under scrutiny. The IT auditor recommends increasing the encryption key length for certain applications to improve security. What is the PRIMARY reason to increase the encryption key length?
To speed up encryption and decryption processes
To ensure compatibility with older systems
To reduce the possibility of a brute force attack
To reduce the key management overhead
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni
Quiz
•
University - Professi...
20 questions
basisdata1
Quiz
•
University
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
18 questions
Memory-Mobo-Hard/Software
Quiz
•
University
15 questions
tik kelas 7
Quiz
•
1st Grade - University
16 questions
Digital Icons
Quiz
•
12th Grade - University
20 questions
PARC Linux Basic Part 2
Quiz
•
University
20 questions
CSS Pseudo dan CSS Grid System
Quiz
•
University
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade
Discover more resources for Computers
8 questions
2 Step Word Problems
Quiz
•
KG - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
10 questions
14.2 Independent/Dependent Variables
Quiz
•
KG - University
18 questions
Great Lakes States
Quiz
•
KG - University
7 questions
DNA, Chromosomes, Genes, and Traits: An Intro to Heredity
Interactive video
•
11th Grade - University
7 questions
Reflexive Verbs in Spanish
Lesson
•
9th Grade - University
7 questions
Narrative Writing 1
Interactive video
•
4th Grade - University