When you have a computer on which you use sensitive information like bank details and passwords, you’re probably content in the knowledge that it’s being protected so long as you have decent internet security installed. Have you ever stopped to think about what processes go into ensuring computers are kept safe from malware and hacking? Take this quiz to learn all about it! Good luck!
Store all sensitive documents in a pile on the right side of the desk.
Place them in the laptop bag when no longer needed.
Shred all documents.
Place them in the recycle bin for recycling.
Rate this question:
Request a new one.
Remotely wipe the device.
Call the phone and ask for it back.
Disable Bluetooth on the device.
Rate this question:
Thumb drives do not have the capacity to store the data needed.
The data on a thumb drive cannot be encrypted.
Thumb drives are too big to carry from location to location.
The drive could carry a virus from home to the office.
Rate this question:
Trojan virus
Rootkit
Keylogger
Logic bomb
Rate this question:
Ensure the phone is password protected.
Ensure no texting software is installed.
Ensure the phone is not running a mobile OS.
Ensure the phone is not configured for e-mail.
Rate this question:
Username and password
Smartcard
PIN number
Fingerprint
Retina scan
Rate this question:
Review logs
See if anyone wants his office space
Disable the employee’s user accounts and access cards
Format the drive on his workstation
Rate this question:
Educate Sue on the fact that those programs are popular ways to spread viruses, so no, the company does not allow P2P software on its systems.
Tell her no.
Tell her yes as long as she does not watch the movies during work hours.
Tell her yes as long as she places the downloaded movies on the server so that you can virus scan them.
Rate this question:
Man-in-the-middle
Spoofing
Denial of service
Port scanning
Rate this question:
VPN policy
Password policy
AUP
Secure disposal of computers
Rate this question:
Use a lockdown cable.
Encrypt the drive.
Disable booting from CD/DVD.
Log off the workstation.
Rate this question:
Rotation of duties
Separation of duties
Least privilege
Due care
Rate this question:
Use a firewall.
User awareness and training.
Install antivirus software.
Implement physical security.
Rate this question:
Install personal firewall.
Disable automatic updates.
Disable real-time protection.
Update virus definitions.
Rate this question:
Confidentiality
Accountability
Integrity
Availability
Rate this question:
To limit fraudulent activities within the organization
To keep data private to the appropriate individuals
To make information available
To ensure the secrecy of the information
Rate this question:
Purchase an additional lock.
Training and awareness.
Purchase a revolving door.
Purchase a mantrap.
Rate this question:
Phishing
Pharming
Spim
Spoofing
Rate this question:
CompNet
HackNet
Botnet
SurfNet
Rate this question:
Create user-friendly applications.
Validate all data inputted.
Ensure the focus is on usability.
Create nice input screens.
Rate this question:
AUP
Password policy
Virus protection policy
Secure disposal of computers
Rate this question:
Malicious software that is triggered by an event such as a specific date
A virus that disguises itself as a legitimate program but actually opens a port on the system
Malicious software that monitors your Internet activity
A virus that self-replicates
Rate this question:
Employees, information
Management, employees
Information, employees
Employees, management
Rate this question:
Locked doors
Electronic keypads
Swipe cards
Mantrap
Rate this question:
Dictionary
Brute-force
Buffer overflow
Privilege escalation
Rate this question:
Whaling
Phishing
Pharming
Spim
Rate this question:
Buffer overflow
SQL injection
Folder traversal
Cross-site scripting
Rate this question:
Disable booting from CD/DVD.
Remove the CD-ROM/DVD-ROM.
Set a strong administrative password.
Implement an account lockout policy.
Rate this question:
MAC filtering
Disabling unnecessary services
Port security
802.1x authentication
Rate this question:
Disable the password.
Lock the screen based on short inactivity periods.
Enable Bluetooth.
Encrypt the data.
Disable emergency calling.
Rate this question:
Rotation of duties
Separation of duties
Least privilege
Due care
Rate this question:
Router
Load balancer
Proxy server
CAT 5e
Rate this question:
Black-hat
Gray-hat
White-hat
Yellow-hat
Rate this question:
Least privilege
Job rotation
Separation of duties
AUP
Rate this question:
Trojan virus
Worm virus
Rootkit
Logic bomb
Rate this question:
ActiveX
Java applets
Macros virus
Cross-site scripting
Rate this question:
Close ports on the system
Assess vulnerability
Fuzzing
Reduce the attack surface
Rate this question:
You need to patch only the host operating system.
You need virus protection only on the host system.
You have less hardware to secure.
No drive encryption is needed.
Rate this question:
The NAS device runs the SMB protocol. (NAS) devices?
If the NAS is not configured properly, a security compromise could compromise all the data on the device.
The NAS device runs the NFS protocol.
The NAS device has a web interface for configuration.
Rate this question:
Least privilege
AUP
Disabling the employee’s user accounts and access cards
Job rotation
Rate this question:
Install a proxy server
Install a load balancer
Configure the web site in a VLAN
Configure port security
Rate this question:
Authenticated
Identified
Authorized
Encrypted
Rate this question:
Postal code
Driver’s license
City name
Social Security number
Street name
Rate this question:
AUP
Hiring policy
VPN policy
Firewall policy
Rate this question:
Library-level
Kernel-level
Application-level
Virtualized
Rate this question:
To keep the employee refreshed and energized
To hold employees accountable for any suspicious activity
To keep the employee happy
To raise company morale
Rate this question:
Patch
Service pack
Hot-fix
Update
Rate this question:
Virtualization
Cloud computing
TCP wrappers
Personal firewall
Rate this question:
Quiz Review Timeline (Updated): Jun 10, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Security Plus Questions: Comptia Quiz!
CompTIA Security+ is an entry-level certification that develops network security knowledge. CompTIA certification covers IT concepts, basic IT literacy, and terminology....
Questions:
47 |
Attempts:
252 |
Last updated:
Oct 24, 2024
|
CompTIA Security+ SY0-501 Practice Test 02
CompTIA Security+ SY0-501 Practice Test 02 assesses knowledge on securing network devices, supporting data integrity, non-repudiation, confidentiality, and theft prevention. Ideal...
Questions:
201 |
Attempts:
168 |
Last updated:
May 14, 2024
|
CompTIA Security+ SY0-501 Practice Test 01
This CompTIA Security+ SY0-501 Practice Test assesses key cybersecurity skills, focusing on the confidentiality, integrity, and availability of information systems. It evaluates...
Questions:
75 |
Attempts:
335 |
Last updated:
Aug 19, 2023
|
Quiz On CompTIA Security+ Certification! Trivia Questions
Are you looking for a quiz to help you in preparation for the CompTIA Security+ Certification? If so, the questionnaire below is precisely what you may need to refresh your...
Questions:
20 |
Attempts:
326 |
Last updated:
Mar 20, 2023
|
Comptia Security+ Practice Exam
Comptia Security+ Practice Exam- 1
Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time...
Questions:
100 |
Attempts:
234 |
Last updated:
May 28, 2024
|
Comptia Security PLUS Practice Exam
Comptia Security+ Practice Exam- 1Full length Comptia Security+ Practice Exam. Take this exam like the
real exam to see if you are completely prepared for the real...
Questions:
100 |
Attempts:
344 |
Last updated:
Dec 05, 2023
|