Security Management MCQs

Security Management MCQs

These Security Management multiple-choice questions and their answers will help you strengthen your grip on the subject of Security Management. You can prepare for an upcoming exam or job interview with these Security Management MCQs.
So scroll down and start answering.

1: A ___________ gives priorities to the functions an organization needs to keep going.

A.   Exposure factor

B.   Business continuity plan (BCP)

C.   Vulnerability

D.   Port scanner

2: A password ______ is a service that stores all of your account information securely.

A.   Manager

B.   Collectionn

C.   Vault

D.   Binder

3: A password ________ a user.

A.   Authenticates

B.   Identifies

C.   Conceals

D.   Encrypts

4: As an is user, you have a right to a secure computing environment. this means that ________.

A.   Technical writer

B.   Steering committee

C.   The organization should protect your computer and its files

D.   Business and systems analysts

5: Forensics and incident response are examples of ___________ controls

A.   Preventive

B.   Detective

C.   Corrective

6: A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

A.   Spider

B.   Server

C.   Client

D.   Bot

A.   Configuration

B.   Security policy

C.   Assets

D.   Guidelines

8: Ensuring end users get prompt attention to their problems is __________.

A.   An example of a​ user's rights

B.   The company develops programs​ in-house.

C.   Chief executive officer​ (CEO)

D.   Outsourcing

9: Normal processing procedures for operations personnel involve procedures for ________.

A.   Systems analysts

B.   Starting, stopping, and operating the system

C.   Cause every line of program code to be executed

D.   System definition

10: ________ are the data that is deemed most important in the operation of a business.

A.   Metadata

B.   Master data

C.   Reference data

D.   Query data

11: You can get comprehensive help at any time by pressing [____] in an office app.

A.   Help

B.   Esc

C.   Ctrl

D.   F1

12: ________ is the process of obscuring an attackers source ip address.

A.   BOTS

B.   EAP,RADUS

C.   802.11i

D.   Spoofing

13: ________ a site means to take extraordinary measures to reduce a system's vulnerability.

A.   Pretexting

B.   Hardening

C.   Spoofing

D.   Phishing

14: Ups devices typically run up to ____ va.

A.   500

B.   1,000

C.   100

D.   250