Security 11

Security 11

Professional Development

50 Qs

quiz-placeholder

Similar activities

IC - Systems Knowledge Check

IC - Systems Knowledge Check

Professional Development

50 Qs

MRO (Maintenance, Repair & Operations)

MRO (Maintenance, Repair & Operations)

Professional Development

50 Qs

YES EXAM REVIEWER - VUL

YES EXAM REVIEWER - VUL

Professional Development

51 Qs

Assessment 1

Assessment 1

Professional Development

55 Qs

Moody's Analytics- Exit Test

Moody's Analytics- Exit Test

Professional Development

50 Qs

MAB

MAB

Professional Development

49 Qs

Health and safety

Health and safety

Professional Development

50 Qs

AZ-900 Practice Test 6

AZ-900 Practice Test 6

Professional Development

51 Qs

Security 11

Security 11

Assessment

Quiz

Other

Professional Development

Easy

Created by

Joe Smith

Used 5+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security engineer at a large company needs to enhance IAM in order to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?

Role-based

Time-of-day restrictions

Least privilege

Biometric authentication

Answer explanation

IAM (Identity and Access Management) setup based on the questions is Time-based Access Management, which is another words Time-of-day restrictions.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to ensure employees are allowed to copy files from a virtual desktop during the workday but are restricted during non-working hours. Which of the following security measures should the company set up?

Digital rights management

Role-based access control

Time-based access control

Network access control

Answer explanation

C. Time-based access control Explanation: • Time-based access control: Restricts or permits access to resources based on specific time frames. This fits the scenario where file copying is allowed only during working hours.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?

SLA

BPA

NDA

MOA

Answer explanation

A non-disclosure agreement (NDA) is a legal contract that limits how confidential information can be used and shared. NDAs are also known as confidentiality agreements, proprietary information agreements, or secrecy agreements.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator just purchased multiple network devices. Which of the following should the systems administrator perform to prevent attackers from accessing the devices by using publicly available information?

Install endpoint protection.

Disable ports/protocols.

Change default passwords.

Remove unnecessary software.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A CVE in a key back-end component of an application has been disclosed. The systems administrator is identifying all of the systems in the environment that are susceptible to this risk. Which of the following should the systems administrator perform?

Packet capture

Vulnerability scan

Metadata analysis

Automated reporting

Answer explanation

B. Vulnerability Scan Why? A vulnerability scan systematically checks systems against a database of known vulnerabilities (including CVEs). It helps identify which systems, applications, or services are affected by the disclosed CVE. Most vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) provide detailed reports and potential remediation steps. Why Not the Others? A. Packet Capture – Used for network traffic analysis, but it won’t directly identify vulnerable systems. C. Metadata Analysis – Involves examining file or system metadata, which is not relevant for detecting software vulnerabilities. D. Automated Reporting – Helps document findings but does not actively identify vulnerable systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following activities uses OSINT?

Social engineering testing

Data analysis of logs

Collecting evidence of malicious activity

Producing IOC for malicious artifacts

Answer explanation

Answer: A. Social engineering testing Open Source Intelligence (OSINT) involves gathering information from publicly available sources. Social engineering testing often uses OSINT to collect data about individuals or organizations to craft convincing phishing attacks or other social engineering tactics. Why the other options are not correct: C. Collecting evidence of malicious activity Collecting evidence of malicious activity typically involves forensic analysis of compromised systems or networks, which relies on internal data and artifacts rather than publicly available information. D. Producing IOCs for malicious artifacts Producing Indicators of Compromise (IOCs) involves analyzing malware or attack patterns to create signatures or identifiers. This process is based on technical analysis of malicious artifacts, not on publicly available information.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the best security controls for controlling on-premises access? (Choose two.)

Swipe card

Picture ID

Phone authentication application

Biometric scanner

Camera

Answer explanation

A. Swipe Card ✔ Provides physical access control to restricted areas. ✔ Can be integrated with access logs to track entries and exits. ✔ Easy to revoke or deactivate if lost or stolen. D. Biometric Scanner ✔ Verifies identity using unique physical traits (e.g., fingerprint, iris, or facial recognition). ✔ Cannot be shared or stolen like swipe cards or PIN codes. ✔ Adds an extra layer of security by ensuring the person entering is the authorized individual.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?