Search Header Logo

Security Plus 701 Mega Challenge 1

Authored by Prem Jadhwani

Professional Development

Professional Development

Used 57+ times

Security Plus 701 Mega Challenge 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MATCH QUESTION

2 mins • 1 pt

Match the Mobile Device Terms to their Respective Definitions.

COBO

Company purchases and issues device that can only be used for business purposes.

CYOD

Employee brings any device that they own and can use it for business and personal use.

COPE

Employee chooses a device from a list of acceptable devices published by the company.

MDM

Company purchases and issues device that can be used for business and for personal use.

BYOD

A Software that is installed on a mobile device that gives a company control over corporate data stored on the device.

2.

MATCH QUESTION

2 mins • 1 pt

Match the following terms to their definitions.

Sideloading

A command a company can send to an employee device to remove corporate data.

Jailbreaking

A system that can be used to scan mobile devices for health conditions before it connects to a network.

Remote Wipe

A technology we can use to keep all data on a mobile device safe in the event that it is stolen or lost.

FDE

Installing unverified software onto a mobile device that would typically be restricted.

NAC

Removing the software restrictions from a mobile device.

3.

MATCH QUESTION

2 mins • 1 pt

Match the Access Control Models to the correct Pointer Word.

MAC

Access Control rights are determined by an employees position or title.

DAC

Access Control rights are determined security labels and security levels.

ABAC

Access Control rights are determined by a set of rules and mandates.

RuBAC

Access Control rights are determined by several varying factors and properties.

RBAC

Access Control rights are at the discretion of a human.

4.

MATCH QUESTION

2 mins • 1 pt

Match the following Account Controls to the correct definitions.

Least Privilege

A configuration that will check the geographic distance between two account logins.

MFA

Ensures users are using more than one way to authenticate, increasing security.

Account Lockout

A setting that will lock an account after an action.

Impossible Travel Time (ITT)

Ensures users have only the accesses needed to perform their job.

PAM

Manages domain admin accounts by limiting permissions, and prevents Pass-the-Hash Attack.

5.

MATCH QUESTION

2 mins • 1 pt

Match the following terms with the most appropriate definition.

Jump Server

Best option for giving a contractor secure access to an internal system.

IaC

Best architecture to use for maximum redundancy for critical systems.

Microservices

The benefits of this architecture include enhanced scalability and compartmentalization.

Cloud-Native

This automates infrastructure deployment using code, making server provisioning faster.

EOL

Term for a piece of equipment that is no longer receiving patch updates or support from the manufacturer.

6.

MATCH QUESTION

2 mins • 1 pt

Match the correct terms to the appropriate definitions.

Data-in-Use

Data that is being stored, or has been archived.

Data-at-Rest

Removing data from drives in a repeatable manner. Helps prevent data recovery by hackers.

Data-in-Transit

Data that is actively being transmitted between two points.

Certification

Data that is being processed by a program or application.

Sanitization

The process of verifying that all data has actually been removed from a device.

7.

MATCH QUESTION

2 mins • 1 pt

Match the following.

Data tokenization

Keeps a data inventory of all data that our company collects.

Data Protection Officer

The process of identifying what data falls into what categories.

Data Masking

Best way to protect data being transmitted over the internet.

Encryption

Best way to protect credit card data in a testing environment using obfuscation.

Data Classification

Best way to protect credit card data that is being stored in a database from theft.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development