0 of 17 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 17 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Your organization has a contract to provide networking services to a government agency. You are required to use certified hardware to build a secure network. Which of the following practices will help you avoid adversarial threats in the supply chain? (Choose all that apply.)
Your client is a small retailer that accepts orders via e-mail. The e-mail form submitted by a client’s customer includes credit card information, and you demonstrate to the client how risky that is. As a result, the client adds secure credit card processing to their website, and no longer accepts e-mail orders. Which Risk management concept does this represent?
Zero Trust is a security model that emphasizes continuous verification. Which of the following is a core principle of Zero Trust?
Match the sensor with its corresponding description:
This type of sensor would be appropriate to detect a person’s body heat when the person enders a controlled space such as a sever room. These sensors look for changes in infrared or heat radiation. Infrared sensors are also suitable in dark or unlit environments, as they work on heat as opposed to light.
|
|
This type of sensor activate in response to pressure in an area or when the targeted surface changes. It can be embedded in a floor mat, so that when someone steps on the mat, the sensor activates and sends an alert. They can even be used to protect exit doors.
|
|
These sensors are somewhat more sophisticated than the others. These use a baseline signature of a room or enclosed space “at rest” without any activity. They are more sensitive than infrared and are much more sensitive in detecting movement. Their increased sensitivity makes them susceptible to false positives, and so they are usually combined with other types of devices.
|
|
These sensors use high-frequency sound waves to measure the time it takes for the sound wave to bounce back after reflecting off a surface. If the sound returns sooner than it should, that time difference would indicate the presence of an object that should not be there.
|
|
A security standard defines:
A company implements a microservices architecture to improve application scalability. This approach can introduce new security challenges related to:
A user reports experiencing frequent account lockouts on their work computer. This could be an indicator of:
Software-defined networking (SDN) provides flexibility for network management. However, it also introduces a security consideration. What is a potential security concern with SDN?
What is the primary purpose of DNSSEC (DNS Security Extensions)?
Which of the following is an independent third party which provides validation services to assure that a digital certificate is genuine?
Which of the following has Firewall as a Service (FWaaS) as a component?
Which is the best way to ensure risk levels remain within acceptable limits of the organization’s risk appetite?
A healthcare organization wants to enhance the security of its electronic health record (EHR) system. Which solution, from the choices below, would be most appropriate for implementing multifactor authentication?
Which of the following activities are associated with application security in vulnerability management? (Select two.)
You are the security administrator for your company. You identify a security risk. You decide to continue with the current security plan. However, you develop a contingency plan to implement if the security risk occurs. Which type of risk response strategy are you demonstrating?