Sec+ Study Quiz 13

Quiz
•
Computers
•
Professional Development
•
Hard
Pat Johnson
FREE Resource
42 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following documents specifies what to do in the event of catastrophic loss of a physical or virtual system?
Data retention plan
Incident response plan
Disaster recovery plan
Communication plan
Answer explanation
The correct choice is the Disaster recovery plan, which specifies what to do in the event of catastrophic loss of a physical or virtual system.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following roles is responsible for defining the protection type and classification type for a given set of files?
General counsel
Data owner
Risk manager
Chief Information Officer
Answer explanation
The data owner is responsible for defining the protection type and classification type for a given set of files.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee's company email is configured with conditional access and requires that MFA is enabled and used. An example of MFA is a phone call and:
a push notification
a password
an SMS message
an authentication application
Answer explanation
The correct choice for MFA in the scenario described is an authentication application, which is an example of a method used for multi-factor authentication.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a security implication of newer ICS devices that are becoming more common in corporations?
Devices with cellular communication capabilities bypass traditional network security controls
Many devices do not support elliptic-curve encryption algorithms due to the overhead they require
These devices often lack privacy controls and do not meet newer compliance regulations
Unauthorized voice and audio recording can cause loss of intellectual property
Answer explanation
Devices with cellular communication capabilities bypass traditional network security controls, posing a security risk in corporations.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?
Hashing
DNS sinkhole
TLS inspection
Data masking
Answer explanation
TLS inspection is required for an IDS and a WAF to be effective on HTTPS traffic as it allows for the decryption and analysis of encrypted traffic.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company policy requires third-party suppliers to self-report data breaches within a specific time frame. Which of the following third-party risk management policies is the company complying with?
MOU
SLA
EOL
NDA
Answer explanation
The company is complying with the SLA policy by requiring third-party suppliers to self-report data breaches within a specific time frame.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While troubleshooting service disruption on a mission-critical server, a technician discovered the user account that was configured to run automated processes was disabled because the user's password failed to meet password complexity requirements. Which of the following would be the best solution to securely prevent future issues?
Using an administrator account to run the processes and disabling the account when it is not in use
Implementing a shared account the team can use to run automated processes
Configuring a service account to run the processes
Removing the password complexity requirements for the user account
Answer explanation
Configuring a service account to run the processes is the best solution as it ensures secure automation without relying on individual user accounts.
Create a free account and access millions of resources
Similar Resources on Wayground
44 questions
AWS Certified Cloud Practitioner

Quiz
•
5th Grade - Professio...
39 questions
AAD-300

Quiz
•
Professional Development
38 questions
IT Basic Assesment

Quiz
•
7th Grade - Professio...
42 questions
CWT-101 Part 3

Quiz
•
Professional Development
46 questions
Redes 5206

Quiz
•
Professional Development
40 questions
สอบกลางภาค วิชาจริยธรรมและกฎหมายคอมพิวเตอร์

Quiz
•
Professional Development
45 questions
Cybersecurity

Quiz
•
Professional Development
45 questions
Entrepreneurship Final Revision

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade