placeholder image to represent content

MONDAY - Security+ Pre-Assessment

Quiz by Gareth Marchant

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
20 questions
Show answers
  • Q1

    Which of the following categories of control describe surveillance cameras?

    Technical

    Administrative

    Physical

    Directive

    60s
  • Q2

    The term AAA represents:

    Accountability, Authorization, Auditing

    Authorization, Authentication, Auditing

    Authentication, Authorization, Accounting

    Auditing, Assessment, Action

    60s
  • Q3

    This threat actor group is focused on monetization

    Hacktivist

    Organized Crime

    Shadow IT

    Nation State

    60s
  • Q4

    An adversary gains access to a target organization by pushing malware from the online ordering website of a sandwich shop frequented by the target organization's employees.

    Phishing

    Typosquatting

    Watering Hole

    Impersonation

    60s
  • Q5

    Which of the following formats is most closely associated with deploying resources using IaC?

    SAML

    XML

    YAML

    YARA

    60s
  • Q6

    This method is often used to secure credit card data 

    Hashing

    Obfuscation

    Tokenization

    De-anonymization

    60s
  • Q7

    A unique feature of Wi-Fi Protected Access 3

    Data Loss Prevention

    Simultaneous Authentication of Equals

    AAA

    RADIUS

    60s
  • Q8

    Which of the following can be used to help prioritize work done to remediate an identified vulnerability?

    Certification

    Input Validation

    DMARC

    CVSS

    60s
  • Q9

    This item is generally associated with the backup sets used during disaster recovery

    Data Subject

    ARO

    Service Level Agreements

    RPO

    60s
  • Q10

    Which of the following roles is accountable for the protection of sensitive data?

    Custodian

    Owner

    Processor

    Subject

    60s
  • Q11

    Which of the following best defines non-repudiation

    Cannot deny

    Cannot confirm

    Cannot access

    Cannot authenticate

    60s
  • Q12

    What control objective does a "cameras in use" sign represent?

    Detective

    Preventive

    Deterrent

    Directive

    60s
  • Q13

    Which of the following best characterizes a virus?

    Requires user interaction

    Self-propagates

    Typically causes DOS

    Steals private data

    60s
  • Q14

    The most effective method for breaching a password

    Spraying

    Brute force

    Social engineering

    Dictionary attack

    60s
  • Q15

    Which IEEE standard defines NAC?

    802.11x

    802.3

    802.5

    802.1x

    60s

Teachers give this quiz to your class