Security+ Domain 1

Security+ Domain 1

12th Grade

49 Qs

quiz-placeholder

Similar activities

Q3-WD PT

Q3-WD PT

12th Grade

48 Qs

Assessment - Unit 1 Review

Assessment - Unit 1 Review

9th - 12th Grade

45 Qs

Software Development Life Cycle

Software Development Life Cycle

12th Grade

45 Qs

Fundamentals of Cyber Security

Fundamentals of Cyber Security

9th - 12th Grade

45 Qs

SOAL PSAJ 2024 - KOMPETENSI KEAHLIAN TKJ

SOAL PSAJ 2024 - KOMPETENSI KEAHLIAN TKJ

12th Grade

45 Qs

ET MID TERM REVIEW

ET MID TERM REVIEW

12th Grade

51 Qs

MIDTERM EXAM IPT

MIDTERM EXAM IPT

12th Grade

50 Qs

BTEC Level 3 IT

BTEC Level 3 IT

12th Grade

50 Qs

Security+ Domain 1

Security+ Domain 1

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Kari Cobb

Used 5+ times

FREE Resource

49 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements about honeyfiles are true? (Select two.)

Honeyfiles work with network intrusion detection systems (NIDs) and can help prevent false positives.

Honeyfiles can only be created by system administrators.

Honeyfiles are designed to provide real data to the attacker.

Honeyfiles are named in a way that makes them attractive to hackers, enticing them to open or execute them.

Honeyfiles are used to block all types of malicious traffic.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?

Smart card

Keypad locks

Proximity card

Biometric locks

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are control categories? (Select three.)

Preventative

Operational

Managerial

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a system administrator at a software company. You have been tasked with verifying the integrity of a large software update file that has been downloaded from the internet. The software provider has provided a SHA256 hash of the file for verification purposes. You decide to use the Get-FileHash command in PowerShell to calculate the hash of the downloaded file. Which of the following scenarios best demonstrates the correct use of the Get-FileHash command for this purpose?

You use the Get-FileHash command to calculate the hash of the downloaded file and send it to the software provider for verification.

You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash provided by the software provider. If the hashes match, you assume the file has not been tampered with.

You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash of another file downloaded from the internet. If the hashes match, you assume the file has not been tampered with.

You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash of the original file on your system. If the hashes match, you assume the file has not been tampered with.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term for the process of validating a subject's identity?

Authorization

Authentication

Auditing

Identification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate?

MD5

SHA

RIPEMD

HMAC

7.

OPEN ENDED QUESTION

3 mins • 1 pt

A newly launched online store wants to secure transactions between the store and customers. The store must guarantee the authenticity of transactions, provide confidentiality, and ensure that only authorized recipients can access the purchase details.

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers