Security Plus 701 Mega Challenge 1

Security Plus 701 Mega Challenge 1

Professional Development

15 Qs

quiz-placeholder

Similar activities

Quantitative and Qualitative

Quantitative and Qualitative

Professional Development

15 Qs

TECH TRENDS

TECH TRENDS

Professional Development

20 Qs

Metro by T-Mobile Plans and Services

Metro by T-Mobile Plans and Services

Professional Development

15 Qs

Sports Analytics

Sports Analytics

Professional Development

15 Qs

3.2 Assessment Vocabulary

3.2 Assessment Vocabulary

Professional Development

14 Qs

Data Protection quiz

Data Protection quiz

Professional Development

10 Qs

Security Plus 701 Mega Challenge 1

Security Plus 701 Mega Challenge 1

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Prem Jadhwani

Used 46+ times

FREE Resource

15 questions

Show all answers

1.

MATCH QUESTION

2 mins • 1 pt

Match the Mobile Device Terms to their Respective Definitions.

CYOD

A Software that is installed on a mobile device that gives a company control over corporate data stored on the device.

COPE

Company purchases and issues device that can only be used for business purposes.

MDM

Employee brings any device that they own and can use it for business and personal use.

COBO

Employee chooses a device from a list of acceptable devices published by the company.

BYOD

Company purchases and issues device that can be used for business and for personal use.

2.

MATCH QUESTION

2 mins • 1 pt

Match the following terms to their definitions.

Jailbreaking

Installing unverified software onto a mobile device that would typically be restricted.

Sideloading

Removing the software restrictions from a mobile device.

NAC

A technology we can use to keep all data on a mobile device safe in the event that it is stolen or lost.

FDE

A system that can be used to scan mobile devices for health conditions before it connects to a network.

Remote Wipe

A command a company can send to an employee device to remove corporate data.

3.

MATCH QUESTION

2 mins • 1 pt

Match the Access Control Models to the correct Pointer Word.

DAC

Access Control rights are determined by a set of rules and mandates.

ABAC

Access Control rights are determined by several varying factors and properties.

RuBAC

Access Control rights are determined security labels and security levels.

RBAC

Access Control rights are at the discretion of a human.

MAC

Access Control rights are determined by an employees position or title.

4.

MATCH QUESTION

2 mins • 1 pt

Match the following Account Controls to the correct definitions.

MFA

A setting that will lock an account after an action.

Impossible Travel Time (ITT)

A configuration that will check the geographic distance between two account logins.

PAM

Manages domain admin accounts by limiting permissions, and prevents Pass-the-Hash Attack.

Least Privilege

Ensures users have only the accesses needed to perform their job.

Account Lockout

Ensures users are using more than one way to authenticate, increasing security.

5.

MATCH QUESTION

2 mins • 1 pt

Match the following terms with the most appropriate definition.

Jump Server

Term for a piece of equipment that is no longer receiving patch updates or support from the manufacturer.

Microservices

This automates infrastructure deployment using code, making server provisioning faster.

EOL

Best architecture to use for maximum redundancy for critical systems.

IaC

The benefits of this architecture include enhanced scalability and compartmentalization.

Cloud-Native

Best option for giving a contractor secure access to an internal system.

6.

MATCH QUESTION

2 mins • 1 pt

Match the correct terms to the appropriate definitions.

Data-in-Transit

Removing data from drives in a repeatable manner. Helps prevent data recovery by hackers.

Data-in-Use

Data that is actively being transmitted between two points.

Sanitization

The process of verifying that all data has actually been removed from a device.

Certification

Data that is being stored, or has been archived.

Data-at-Rest

Data that is being processed by a program or application.

7.

MATCH QUESTION

2 mins • 1 pt

Match the following.

Data tokenization

Best way to protect PII data in a test environment using obfuscation.

Data Classification

Best way to protect credit card data that is being stored in a database from theft.

Data Protection Officer

Best way to protect data being transmitted over the internet.

Encryption

The process of identifying what data falls into what categories.

Data Masking

Keeps a data inventory of all data that our company collects.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Professional Development