0 of 17 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 17 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Match the correct description/explanation to the term.
Security
|
|
Confidentiality
|
|
Integrity
|
|
Availability
|
|
Confidentiality means that information is only revealed to authorized people. Which of the following are confidentiality concerns? (Choose all that apply)
Integrity means that the data being stored and transferred has not been altered without authorization. Which of the following are integrity concerns? (Choose all that apply)
Availability means keeping a service running so that authorized users can access and process data whenever necessary. Which of the following are availability concerns?
An access control system normally consists of one or more of the following types of controls: (Choose all that apply)
Social engineering refers to means of getting users to reveal confidential information or obtaining unauthorized physical access to a resource.
What are some social engineering techniques? (Choose all that apply)
Windows authentication involves which of the following? (Choose all that apply)
With knowledge-based authentication passwords are stored as a __________________.
Which of the following authentication method is the MOST appropriate to use?
John wants to make sure that he is the only person that can access his Bank account and no one else. How should John proceed?
John was using single factor authentication to access his network resources. One morning he reported to the IT department that he suspects his account has been compromised. Which did john most likely do? (Choose all that apply)
Which of the following is represents identification?
A company purchased a software package and was told that it was infected with a specific type of malware? Which of the following should the company likely have done?
What are some of the general principles of Privileged access management (PAM)? Match them to their respective description/definition.
Least privilege
|
|
Role-based access
|
|
Zero trust
|
|
What is the difference between vulnerability assessment and Penetration testing?
What is the difference between posture assessment and process assessment as it relates to risk? (Choose all that apply)
factors
Risk management is a process for identifying, assessing, and mitigating vulnerabilities and threats to the essential functions that a business must perform to serve its customers.