Chapter 01 - Basic Objectives of CS

Chapter 01 - Basic Objectives of CS

Professional Development

20 Qs

quiz-placeholder

Similar activities

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Professional Development

20 Qs

GCP-FOUND3

GCP-FOUND3

Professional Development

20 Qs

Security+ Study Guide-05 Securing Hosts and Data

Security+ Study Guide-05 Securing Hosts and Data

Professional Development

15 Qs

Security and Domain

Security and Domain

Professional Development

20 Qs

Security SY0701

Security SY0701

Professional Development

20 Qs

CySA Review 7 & 8

CySA Review 7 & 8

Professional Development

21 Qs

 Network Security Fundamentals

Network Security Fundamentals

Professional Development

20 Qs

Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Professional Development

15 Qs

Chapter 01 - Basic Objectives of CS

Chapter 01 - Basic Objectives of CS

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Ayomide Oluwaga

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which category of control is focused on the management of security policies and procedures within an organization?

Operational

Technical

Corrective

Managerial

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Jade's organization recently suffered a security breach that affected stored credit card data. Jade's primary concern is the fact that the organization is subject to sanctions for violating the provisions of the Payment Card Industry Data Security Standard. What category of risk is concerning Jade?

Strategic

Compliance

Operational

Financial

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Chris is responding to a security incident that compromised one of his organization's web servers. He believes that the attackers defaced one or more pages on the website. What cybersecurity objective did this attack violate?

Confidentiality

Nonrepudiation

Integrity

Availability

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Gwen is exploring a customer transaction reporting system and discovers the table shown here. What type of data minimization has most likely been used on this table?

Destruction

Masking

Tokenization

Hashing

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Tonya is concerned about the risk that an attacker will attempt to gain access to her organization's database server. She is searching for a control that would discourage the attacker from attempting to gain access. What type of security control is she seeking to implement?

Preventive

Detective

Corrective

Deterrent

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Greg is implementing a data loss prevention system. He would like to ensure that it protects against transmissions of sensitive information by guests on his wireless network. What DLP technology would best meet this goal?

Watermarking

Pattern recognition

Host-based

Network-based

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What term best describes data that is being sent between two systems over a network connection?

Data at rest

Data in motion

Data in processing

Data in use

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?