Section 1 part 2

Section 1 part 2

University

40 Qs

quiz-placeholder

Similar activities

INTERPROFESSIONAL CARE IN THE COMMUNITY

INTERPROFESSIONAL CARE IN THE COMMUNITY

University

39 Qs

BTVI - 2204 Cohort 4 - Midterm Exam

BTVI - 2204 Cohort 4 - Midterm Exam

University

45 Qs

Motivation Theories

Motivation Theories

University

38 Qs

Translation 3 Abbreviations

Translation 3 Abbreviations

University

36 Qs

Module I: Understanding Operating Systems

Module I: Understanding Operating Systems

12th Grade - University

45 Qs

FNAF

FNAF

6th Grade - University

36 Qs

Ulangan Proxy

Ulangan Proxy

University

35 Qs

Rekap soal (D3) Perka nomor 2 Tahun 2014 tata naskah dinas

Rekap soal (D3) Perka nomor 2 Tahun 2014 tata naskah dinas

University

35 Qs

Section 1 part 2

Section 1 part 2

Assessment

Quiz

Other

University

Easy

Created by

Sharif Jr

Used 1+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for an entryway in a secure facility where only one door can be open at a time to stop unauthorized individuals from following someone through?

Bollard

Fence

Access control vestibule

Honeypot

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After system modifications, a specialist examines reports from a security information system for any irregularities. What part of the change process is this?

Maintenance window

Documentation

Testing

Backout plan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a company rule dictates that development servers should create their own security certificates, except when official ones are required, what kind of instruction is this?

Preventive

Detective

Directive

Corrective

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Programmers place a decoy, non-functional access key within pre-production software. If this key is ever used, it sets off an alarm. What is this deceptive tool called?

Honeyfile

Honeypot

Honeynet

Honeytoken

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a regular security compliance check, evidence of formal authorization for software updates is required. What operational procedure is being verified?

Version control

Stakeholder management

Approval process

Backout plan

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for the type of encryption that scrambles specific pieces of data within a database, rather than the entire database or file?

File

Partition

Record

Full-disk

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a system that manages encryption keys automatically changes the keys used by automated services every three months, what is this operational routine called?

SOP

Version control

Maintenance window

Key management

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?