Security Fundamental

Security Fundamental

University

25 Qs

quiz-placeholder

Similar activities

Unit 6 System Admin

Unit 6 System Admin

8th Grade - University

30 Qs

Secure Programming Practices

Secure Programming Practices

University

23 Qs

BCS Systems & Architecture Quiz 4

BCS Systems & Architecture Quiz 4

University - Professional Development

24 Qs

crypto first round

crypto first round

University

20 Qs

BCS Systems & Architecture Quiz 1

BCS Systems & Architecture Quiz 1

University - Professional Development

20 Qs

Cyber Crime

Cyber Crime

University

20 Qs

UTS SISTEM OPERASI

UTS SISTEM OPERASI

University

20 Qs

BSIT 3-2 - Information Assurance and Security 1

BSIT 3-2 - Information Assurance and Security 1

University

24 Qs

Security Fundamental

Security Fundamental

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Michael Anyaeze

Used 7+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of a Non-Disclosure Agreement (NDA) during onboarding?

To issue security tokens

To provision user accounts

To protect sensitive company information

To assign default privileges

Answer explanation

The purpose of a Non-Disclosure Agreement (NDA) during onboarding is to protect sensitive company information. It ensures that new employees do not disclose confidential data, safeguarding the company's interests.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which principle states that users should only be given permissions necessary to perform their job?

Separation of duties

Mandatory vacations

Least privilege

Role-based access

Answer explanation

The principle of 'Least privilege' ensures that users are granted only the permissions necessary to perform their job functions, minimizing potential security risks.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which account is a key target for attackers and often disabled after system installation?

Guest account

Service account

Standard user account

Administrator/root account

Answer explanation

The Administrator/root account is a primary target for attackers due to its high-level access. It is often disabled after installation to enhance security and prevent unauthorized access.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why are shared accounts discouraged in a secure environment?

They are more expensive to maintain

They break the principle of non-repudiation

They offer better collaboration

They improve password rotation

Answer explanation

Shared accounts compromise non-repudiation because it's unclear who performed an action, making accountability difficult. This undermines security protocols and can lead to unauthorized access or actions.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a major risk associated with generic device accounts?

Network congestion

They automatically log out users

Default passwords may not be changed

Incompatibility with MFA

Answer explanation

A major risk with generic device accounts is that default passwords may not be changed, leaving systems vulnerable to unauthorized access. This can lead to security breaches and data loss.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which account type typically has limited privileges and cannot change system configuration?

Standard user

Guest user

Service account

Superuser

Answer explanation

A Standard user account typically has limited privileges, preventing it from changing system configurations. This contrasts with Superuser accounts, which have full access, and Guest or Service accounts, which have even more restrictions.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of job rotation policies?

To enforce working hours

To reduce dependency on one employee and distribute knowledge

To increase salaries

To simplify account provisioning

Answer explanation

Job rotation policies aim to reduce dependency on a single employee by encouraging knowledge sharing and skill development across the team. This enhances flexibility and ensures that critical tasks can be managed by multiple individuals.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?