
Week 1 review Sec+

Quiz
•
Computers
•
Professional Development
•
Medium
Connor Hach
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization has set up an intrusion detection system (IDS) to monitor network traffic for suspicious activity and alert the security team in case of a potential threat. This system is an example of which type of security control?
Technical, Detective
Physical, Deterrent
Operational, Corrective
Managerial, Directive
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A government agency is upgrading its physical security measures to safeguard its premises from unauthorized entry. They plan to install security guards, access control vestibules, and bollards. Which security concept best describes their approach to controlling physical access to their facilities?
Zero Trust
Deception and Disruption technology
Authentication
Physical Security
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An IT department is rolling out a new version of software used across multiple departments. During the change management process, they identify that the new software version is incompatible with an older application that one department relies on. What aspect of the change management process did they likely overlook?
Approval process
Impact analysis
Documentation
Maintenance window
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a routine security audit, the IT team discovers gaps in log monitoring and reporting. Which tool or technology can the team implement to address this issue effectively?
SIEM
Antivirus software
Vulnerability scanner
Data loss prevention (DLP)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company's sensitive data was stolen by a highly sophisticated group that appeared to be well-funded and had access to advanced tools and techniques. This group was later identified as working on behalf of a foreign government. Which type of threat actor is responsible for this attack?
Hacktivist
Insider threat
Organized-crime
Nation-state
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A disgruntled employee intentionally leaked confidential company information to the public after being passed over for a promotion. What type of threat actor does this scenario describe?
Hacktivist
Insider threat
Unskilled attacker
Organized crime
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A large financial institution experiences a coordinated attack on its systems, resulting in a significant loss of customer data. The attackers demand a ransom to stop further attacks and to return the stolen data. Which motivation aligns with this scenario?
Philosophical/political beliefs
Disruption/chaos
Financial gain
Ethical
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
PC Security

Quiz
•
Professional Development
16 questions
Cyber Resilience Training

Quiz
•
Professional Development
13 questions
Cybersecurity training - Cryptography 2

Quiz
•
Professional Development
16 questions
Introduction to Cybersecurity + linux

Quiz
•
Professional Development
15 questions
ISC2 - Chapter 1 - Module 1 - G2

Quiz
•
Professional Development
15 questions
AI Cybersecurity Quiz

Quiz
•
Professional Development
10 questions
Evaluación de Seguridad en Spring

Quiz
•
Professional Development
10 questions
e-commerce security TRUE/FALSE Quiz

Quiz
•
University - Professi...
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade