Microsoft SC-900 Day 5 & 6

Microsoft SC-900 Day 5 & 6

Professional Development

15 Qs

quiz-placeholder

Similar activities

Quiz on Operating System Services

Quiz on Operating System Services

Professional Development

15 Qs

IBM-SD

IBM-SD

Professional Development

20 Qs

Part 2.3

Part 2.3

Professional Development

20 Qs

ICT cuk-ugc NET

ICT cuk-ugc NET

Professional Development

17 Qs

Digital Etiquette Quiz

Digital Etiquette Quiz

Professional Development

10 Qs

MTA - Microsoft Operating Systems Review 1

MTA - Microsoft Operating Systems Review 1

10th Grade - Professional Development

20 Qs

Cheese

Cheese

KG - Professional Development

17 Qs

GRC Overview

GRC Overview

Professional Development

10 Qs

Microsoft SC-900 Day 5 & 6

Microsoft SC-900 Day 5 & 6

Assessment

Quiz

Computers

Professional Development

Hard

Created by

DICKO SUMARDIYANSAH

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Who approves the incident response policy?

(ISC)²

Senior management

The security manager

Investor

2.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

True of False? Business continuity planning is a reactive procedure that restores business operations after a disruption occurs.

True

False

3.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Which of the following is likely to be included in the business continuity plan?

Alternate work areas for personnel affected by a natural disaster

The organization’s strategic security approach

Last year’s budge information

Log data from all systems

4.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Tekila works for a government agency. All data in the agency is assigned a particular sensitivity level, called a "classification." Every person in the agency is assigned a "clearance" level, which determines the classification of data each person can access. What is the access control model being implemented in Tekila's agency?

MAC (mandatory access control)

DAC (discretionary access control)

RBAC (role-based access control)

FAC (formal access control)

5.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

In order for a biometric security to function properly, an authorized person's physiological data must be ______.

Broadcast

Stored

Deleted

Modified

6.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control scheme for the company. Handel wants to ensure that operational managers have the utmost personal choice in determining which employees get access to which systems/data. Which method should Handel select?

Role-based access control (RBAC)

Mandatory access control (MAC)

Discretionary access control (DAC)

Security policy

7.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Which of the following roles does not typically require privileged account access?

Security administrator

Data entry professional

System administrator

Help Desk technician

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?