Exam 1: Introduction to Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
A security administrator has both technical knowledge and managerial skills.
Free
(True/False)
4.7/5
(26)
Correct Answer:
True
Which of the three protections ensures that only authorized parties can view information?
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
D
Today's software attack tools do not require any sophisticated knowledge on the part of the attacker.
Free
(True/False)
4.8/5
(31)
Correct Answer:
True
An _______________ is a type of threat that can come from employees, contractors, and business partners, such as a disgruntled worker.
(Short Answer)
4.9/5
(26)
Match the following terms to the appropriate definitions.
-The means by which an attack could occur
(Multiple Choice)
4.9/5
(35)
To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?
(Multiple Choice)
4.9/5
(33)
Match the following terms to the appropriate definitions.
-An item that has value.
(Multiple Choice)
4.8/5
(31)
Match the following terms to the appropriate definitions.
-A flaw or weakness that allows a threat agent to bypass security
(Multiple Choice)
5.0/5
(39)
Which term below is frequently used to describe the tasks of securing information that is in a digital format?
(Multiple Choice)
4.9/5
(32)
Match the following terms to the appropriate definitions.
-Attacker who attacks for ideological reasons that are generally not as well defined as a cyberterrorist's motivation
(Multiple Choice)
5.0/5
(35)
The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security.
(True/False)
4.8/5
(39)
What kind of server connects a remote system through the Internet to local serial ports using TCP/IP?
(Multiple Choice)
4.9/5
(42)
What country is now the number one source of attack traffic?
(Multiple Choice)
4.9/5
(43)
The security protection item that ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter is known as?
(Multiple Choice)
4.8/5
(37)
Match the following terms to the appropriate definitions.
-Automated attack package that can be used without an advanced knowledge of computers
(Multiple Choice)
4.8/5
(39)
The ___________________ reports directly to the chief information officer (CIO), and is responsible for assessing, managing, and implementing security.
(Short Answer)
4.8/5
(30)
Proper ________________ involves identifying risks but making the decision to not engage in the activity.
(Short Answer)
4.8/5
(36)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)