
Security 11
Quiz
•
Other
•
Professional Development
•
Easy
Joe Smith
Used 5+ times
FREE Resource
Enhance your content
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security engineer at a large company needs to enhance IAM in order to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?
Role-based
Time-of-day restrictions
Least privilege
Biometric authentication
Answer explanation
IAM (Identity and Access Management) setup based on the questions is Time-based Access Management, which is another words Time-of-day restrictions.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to ensure employees are allowed to copy files from a virtual desktop during the workday but are restricted during non-working hours. Which of the following security measures should the company set up?
Digital rights management
Role-based access control
Time-based access control
Network access control
Answer explanation
C. Time-based access control Explanation: • Time-based access control: Restricts or permits access to resources based on specific time frames. This fits the scenario where file copying is allowed only during working hours.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?
SLA
BPA
NDA
MOA
Answer explanation
A non-disclosure agreement (NDA) is a legal contract that limits how confidential information can be used and shared. NDAs are also known as confidentiality agreements, proprietary information agreements, or secrecy agreements.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A systems administrator just purchased multiple network devices. Which of the following should the systems administrator perform to prevent attackers from accessing the devices by using publicly available information?
Install endpoint protection.
Disable ports/protocols.
Change default passwords.
Remove unnecessary software.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A CVE in a key back-end component of an application has been disclosed. The systems administrator is identifying all of the systems in the environment that are susceptible to this risk. Which of the following should the systems administrator perform?
Packet capture
Vulnerability scan
Metadata analysis
Automated reporting
Answer explanation
B. Vulnerability Scan Why? A vulnerability scan systematically checks systems against a database of known vulnerabilities (including CVEs). It helps identify which systems, applications, or services are affected by the disclosed CVE. Most vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) provide detailed reports and potential remediation steps. Why Not the Others? A. Packet Capture – Used for network traffic analysis, but it won’t directly identify vulnerable systems. C. Metadata Analysis – Involves examining file or system metadata, which is not relevant for detecting software vulnerabilities. D. Automated Reporting – Helps document findings but does not actively identify vulnerable systems.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following activities uses OSINT?
Social engineering testing
Data analysis of logs
Collecting evidence of malicious activity
Producing IOC for malicious artifacts
Answer explanation
Answer: A. Social engineering testing Open Source Intelligence (OSINT) involves gathering information from publicly available sources. Social engineering testing often uses OSINT to collect data about individuals or organizations to craft convincing phishing attacks or other social engineering tactics. Why the other options are not correct: C. Collecting evidence of malicious activity Collecting evidence of malicious activity typically involves forensic analysis of compromised systems or networks, which relies on internal data and artifacts rather than publicly available information. D. Producing IOCs for malicious artifacts Producing Indicators of Compromise (IOCs) involves analyzing malware or attack patterns to create signatures or identifiers. This process is based on technical analysis of malicious artifacts, not on publicly available information.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are the best security controls for controlling on-premises access? (Choose two.)
Swipe card
Picture ID
Phone authentication application
Biometric scanner
Camera
Answer explanation
A. Swipe Card ✔ Provides physical access control to restricted areas. ✔ Can be integrated with access logs to track entries and exits. ✔ Easy to revoke or deactivate if lost or stolen. D. Biometric Scanner ✔ Verifies identity using unique physical traits (e.g., fingerprint, iris, or facial recognition). ✔ Cannot be shared or stolen like swipe cards or PIN codes. ✔ Adds an extra layer of security by ensuring the person entering is the authorized individual.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
45 questions
Week 2 -Process check
Quiz
•
Professional Development
50 questions
CompTIA A+ Core 2 Final Quiz
Quiz
•
Professional Development
50 questions
I Years_Python
Quiz
•
Professional Development
50 questions
GK- Marathon 13,14 & 15
Quiz
•
8th Grade - Professio...
50 questions
6035 H&S Quiz 2
Quiz
•
Professional Development
50 questions
Terrestrial and Coastal Navigation II
Quiz
•
Professional Development
46 questions
369-668a340acdad4bdec639b596
Quiz
•
Professional Development
50 questions
Uji Kompetensi Unit Airport Security TJQ Q1 Tahun 2023
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade