SYO 701 INTRO TO SECURITY Module FC

SYO 701 INTRO TO SECURITY Module FC

University

20 Qs

quiz-placeholder

Similar activities

Test

Test

KG - University

25 Qs

tik kelas 7

tik kelas 7

1st Grade - University

15 Qs

PARC Linux Basic Part 2

PARC Linux Basic Part 2

University

20 Qs

CSS Pseudo dan CSS Grid System

CSS Pseudo dan CSS Grid System

University

20 Qs

1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni

1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni

University - Professional Development

20 Qs

basisdata1

basisdata1

University

20 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Memory-Mobo-Hard/Software

Memory-Mobo-Hard/Software

University

18 Qs

SYO 701 INTRO TO SECURITY Module FC

SYO 701 INTRO TO SECURITY Module FC

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Wayground Content

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

188. Which of the following is the best way to secure an on-site data center against intrusion from an insider?

A. Security cameras

B. Access badge

C. Firewalls

D. Data encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

27. Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?

A. Safety controls should fail closed

B. Safety controls should be redundant

C. Safety controls should fail open

D. Safety controls should be monitored continuously

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

157. A systems administrator wants to prevent users from being able to access data based on their responsibilities. The administrator also wants to apply the required access structure via a simplified format. Which of the following should the administrator apply to the site recovery resource group?

A. RBAC

B. ACL

C. IAM

D. SSO

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

52. Which of the following is most likely associated with introducing vulnerabilities on a corporate network by the deployment of unapproved software?

A. Authorized Software Deployment

B. Shadow IT

C. Network Segmentation

D. Regular Software Audits

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

225. A manager receives an email that contains a link to receive a refund. After hovering over the link, the manager notices that the domain's URL points to a suspicious link. Which of the following security practices helped the manager to identify the attack?

A. End user training

B. Regular software updates

C. Strong password policies

D. Multi-factor authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

90. Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated: "I'm in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email address." Which of the following are the best responses to this situation? (Choose two).

A. Ignore the message and do nothing.

B. Add a smishing exercise to the annual company training.

C. Issue a general email warning to the company.

D. Respond to the message asking for more details.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

120. An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?

A. Role-based access control

B. Mandatory access control

C. Least privilege

D. Discretionary access control

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?