CompTIA Security + (Part 1)

CompTIA Security + (Part 1)

12th Grade

20 Qs

quiz-placeholder

Similar activities

019_Certificates - CompTIA Security+ SY0-701 - 1.4

019_Certificates - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

23 Qs

Understanding Security Concepts Quiz

Understanding Security Concepts Quiz

12th Grade

20 Qs

security best practices

security best practices

10th Grade - University

20 Qs

Networks

Networks

8th - 12th Grade

18 Qs

Cyber - Unit 2 Review

Cyber - Unit 2 Review

9th - 12th Grade

20 Qs

MTA - Mobility and Devices Fundamentals Part 1

MTA - Mobility and Devices Fundamentals Part 1

10th Grade - Professional Development

20 Qs

L3: Understanding Security Policies

L3: Understanding Security Policies

9th - 12th Grade

21 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

CompTIA Security + (Part 1)

CompTIA Security + (Part 1)

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Quizizz Content

Used 7+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company's IT department considers different approaches to obtaining digital certificates for its internal network infrastructure. The IT department evaluated the use of a Certificate Signing Request (CSR) and third-party Certificate Authorities (CAs) to meet their security requirements. What is the primary advantage of using a CSR and a third-party CA for obtaining digital certificates compared to other methods?

Using a Certificate Signing Request and a third-party Certificate Authority allows for faster deployment of digital certificates within the network.

Using a Certificate Signing Request and a third-party Certificate Authority eliminates the need for regular certificate renewals and maintenance.

Digital certificates obtained through a Certificate Signing Request and a third-party Certificate Authority provide stronger encryption algorithms and key lengths.

Digital certificates obtained through a Certificate Signing Request and a third-party Certificate Authority have a higher level of trust and recognition within the industry.

Answer explanation

Digital certificates from a CSR and third-party CA are widely recognized and trusted, enhancing security and credibility within the industry compared to self-signed certificates or internal CAs.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An educational institution plans to transition from a traditional to a digital learning system. The school's administration has assembled a Change Management Board (CMB) to ensure smooth and secure execution. Within the scope of this educational institution's digital transformation project, what would be the primary role of the CMB?

Overseeing the daily operations of the school's IT department

      

 

Conducting cybersecurity awareness training for all school staff

Assessing, approving, and managing changes in the IT infrastructure

Developing and implementing the school's digital learning curriculum

Answer explanation

The primary role of the Change Management Board (CMB) is to assess, approve, and manage changes in the IT infrastructure, ensuring a smooth transition to the digital learning system.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An educational institution plans to transition from a traditional to a digital learning system. The school's administration has assembled a Change Management Board (CMB) to ensure smooth and secure execution. Within the scope of this educational institution's digital transformation project, what would be the primary role of the CMB?

Overseeing the daily operations of the school's IT department

Conducting cybersecurity awareness training for all school staff

Assessing, approving, and managing changes in the IT infrastructure

Developing and implementing the school's digital learning curriculum

Answer explanation

The primary role of the Change Management Board (CMB) is to assess, approve, and manage changes in the IT infrastructure, ensuring a smooth transition to the digital learning system.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A global e-commerce company faces challenges with its legacy monolithic application. The application is becoming increasingly difficult to maintain due to its intertwined components and struggles to scale quickly enough to handle sudden traffic surges during big sales events. The company has already invested in cloud technology and on-premises infrastructure but still faces scalability and manageability issues. What would MOST effectively address these challenges?

    

Virtualization

Serverless infrastructure

Microservices

Embedded systems

Answer explanation

Microservices effectively address the challenges of a monolithic application by breaking it into smaller, manageable components. This architecture enhances scalability and maintainability, allowing the company to handle traffic surges more efficiently.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Experts at a scientific facility suspect that operatives from another government entity planted malware and are spying on one of their top secret systems. Which attacker type is likely responsible based on the attacker's location and likely goals?

Criminal syndicates 

State actors

Hacktivists

Unskilled attackers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber group is reviewing its web filtering capabilities after a recent breach. Which centralized web-filtering technique groups websites into categories such as social networking, gambling, and webmail?

 Content categorization

Block rules

Uniform resource locators (URL) scanning

Reputation-based filtering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization wants to enhance its cybersecurity by implementing web filtering. The company needs a solution that provides granular control over web traffic, ensures policy enforcement even when employees are off the corporate network, and can log and analyze Internet usage patterns. Which of the following strategies BEST meets these requirements?

    

Manual uniform resource locators (URLs) blocking

 

Centralized web filtering

Agent-based filtering

Reputation-based filtering

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?