Security Quiz Chapter 12

Security Quiz Chapter 12

Professional Development

100 Qs

quiz-placeholder

Similar activities

CCNA 200-301 Aug 2020

CCNA 200-301 Aug 2020

Professional Development

97 Qs

Google Professional Security Engineer

Google Professional Security Engineer

Professional Development

105 Qs

Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1

Certified in Cybersecurity (CC): Full Coverage Mastery Exam 1

Professional Development

101 Qs

CompTIA Security+

CompTIA Security+

Professional Development

98 Qs

ENSA MIDTERM 7,8,9

ENSA MIDTERM 7,8,9

12th Grade - Professional Development

100 Qs

HCSA V6.0

HCSA V6.0

Professional Development

101 Qs

MidSummer_SE1243

MidSummer_SE1243

Professional Development

100 Qs

Traditional web outsystem

Traditional web outsystem

University - Professional Development

98 Qs

Security Quiz Chapter 12

Security Quiz Chapter 12

Assessment

Quiz

Computers

Professional Development

Medium

Created by

William Rodriguez

Used 1+ times

FREE Resource

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three elements of data that need to be ensured for effective protection, collectively known as "CIA"?

Confidentiality, Integrity, Authorization

Confidentiality, Identity, Availability

Confidentiality, Integrity, Availability

Confidentiality, Integration, Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which two mechanisms are commonly used for enforcing data confidentiality?

Encryption and Access Control Lists (ACLs)

Hashing and Logging

Usernames and Passwords

Firewalls and Antivirus Software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of cryptographic hashing and logging in terms of data security?

To validate the integrity of data

To ensure data availability

To encrypt data

To control user access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in protecting your AWS credentials according to the text?

To manage services and edit resources

To protect them from accidental exposure and unauthorized use

To ensure that users have only the permissions they need

To log into the AWS management console

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the second step to ensure when managing AWS credentials?

To give users more permissions than they need

To ensure that users have only the permissions they need, and no more

To frequently change user permissions

To monitor user activity continuously

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a principal in AWS IAM terminology?

A set of credentials used to authenticate with AWS resources

A password policy

An entity that can take an action on an AWS resource

A multi-factor authentication device

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is recommended to secure the root user in AWS?

Enabling a password policy for all IAM users

Creating an IAM user and attaching the AdministratorAccess policy

Using the root user for routine administrative tasks

Requiring an administrator to reset an expired password

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?