
Security+ Domain 1

Quiz
•
Computers
•
12th Grade
•
Medium
Kari Cobb
Used 5+ times
FREE Resource
49 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following statements about honeyfiles are true? (Select two.)
Honeyfiles work with network intrusion detection systems (NIDs) and can help prevent false positives.
Honeyfiles can only be created by system administrators.
Honeyfiles are designed to provide real data to the attacker.
Honeyfiles are named in a way that makes them attractive to hackers, enticing them to open or execute them.
Honeyfiles are used to block all types of malicious traffic.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?
Smart card
Keypad locks
Proximity card
Biometric locks
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following are control categories? (Select three.)
Preventative
Operational
Managerial
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a system administrator at a software company. You have been tasked with verifying the integrity of a large software update file that has been downloaded from the internet. The software provider has provided a SHA256 hash of the file for verification purposes. You decide to use the Get-FileHash command in PowerShell to calculate the hash of the downloaded file. Which of the following scenarios best demonstrates the correct use of the Get-FileHash command for this purpose?
You use the Get-FileHash command to calculate the hash of the downloaded file and send it to the software provider for verification.
You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash provided by the software provider. If the hashes match, you assume the file has not been tampered with.
You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash of another file downloaded from the internet. If the hashes match, you assume the file has not been tampered with.
You use the Get-FileHash command to calculate the hash of the downloaded file and compare it with the hash of the original file on your system. If the hashes match, you assume the file has not been tampered with.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the term for the process of validating a subject's identity?
Authorization
Authentication
Auditing
Identification
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate?
MD5
SHA
RIPEMD
HMAC
7.
OPEN ENDED QUESTION
3 mins • 1 pt
A newly launched online store wants to secure transactions between the store and customers. The store must guarantee the authenticity of transactions, provide confidentiality, and ensure that only authorized recipients can access the purchase details.
Evaluate responses using AI:
OFF
Create a free account and access millions of resources
Similar Resources on Wayground
45 questions
BTEC DIT User interface design

Quiz
•
9th - 12th Grade
52 questions
Q3 ICT Periodical Test

Quiz
•
9th Grade - University
50 questions
DOS LiNux

Quiz
•
9th - 12th Grade
48 questions
Computing Big Quiz

Quiz
•
10th - 12th Grade
45 questions
LATIHAN US/PSAJ

Quiz
•
12th Grade
51 questions
Computer Security Lesson Quiz

Quiz
•
12th Grade
45 questions
Simulasi LCC IT SMA Immanuel Part II

Quiz
•
12th Grade
51 questions
Information Technology Quiz 1 of 3

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade