Part 4.1

Part 4.1

Professional Development

20 Qs

quiz-placeholder

Similar activities

Sec+ CH.2 Review Test

Sec+ CH.2 Review Test

Professional Development

15 Qs

A+ - 16C - Configure SOHO Router Security

A+ - 16C - Configure SOHO Router Security

Professional Development

24 Qs

Networking Fundamentals - Quiz - Winter 2024

Networking Fundamentals - Quiz - Winter 2024

Professional Development

20 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

20 Qs

A+ - 17A - Managing Security Settings

A+ - 17A - Managing Security Settings

Professional Development

24 Qs

ISC2 - Chapter 1 - Module 1 - G2

ISC2 - Chapter 1 - Module 1 - G2

Professional Development

15 Qs

MTA - Mobility and Devices Fundamentals Part 1

MTA - Mobility and Devices Fundamentals Part 1

10th Grade - Professional Development

20 Qs

Cyber Security

Cyber Security

Professional Development

20 Qs

Part 4.1

Part 4.1

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Kirk Marshall

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best demonstrates the application of logical security in a network environment?

Installing surveillance cameras at the data center entrance

Implementing user authentication and access controls on network devices

Using fire extinguishers in server rooms

Placing servers in locked cabinets

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to prevent unauthorized physical access to its servers. Which measure should they apply?

Encrypting all data transmissions

Installing biometric access controls at server room doors

Using strong passwords for user accounts

Segmenting the network into VLANs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can deception technologies be used to enhance network security?

By encrypting all network traffic

By creating fake assets to lure and detect attackers

By physically locking network cables

By updating antivirus software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scenario best illustrates the use of common security terminology in a workplace?

Employees discussing the weather

IT staff referring to "phishing" and "malware" during a security briefing

Managers talking about quarterly sales

Staff planning a team lunch

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to ensure that all access to sensitive data is tracked and reviewed. Which process should they implement?

Network segmentation

Security audit

Deception technology

Physical security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does PCI DSS help organizations protect payment card data?

By providing guidelines for physical building security

By establishing security standards for handling cardholder information

By requiring the use of deception technologies

By mandating the use of biometric authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following actions would help an organization comply with GDPR requirements?

Encrypting personal data and allowing users to request data deletion

Installing more firewalls

Using only physical security measures

Disabling all user accounts

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?