Security System Operator II
Security System Operator II
Answer: B) To monitor and ensure the safety of data and security systems
A) Surveillance cameras
B) Secure access control systems
C) Firewalls
D) Locked doors
Answer: C) Firewalls
A) Data encryption
B) Physical locks
C) Employee uniforms
D) Office lighting
A) Password
B) Fingerprint scanner
C) ID badge
D) Surveillance camera
A) Fire drill
B) Phishing email
C) Office relocation
D) Employee training program
11. Which of the following is a best practice for securing sensitive data in a
computer system?
A) Motion sensors
B) Fire extinguishers
C) Coffee machines
D) Office chairs
A) Deploying firewalls
B) Setting up a backup system
C) Conducting a risk assessment
D) Installing a CCTV system
A) Accessibility
B) Speed of login
C) Reliability of system
D) Security of user accounts
16. Which of the following types of attacks involves sending fraudulent emails to
deceive users into revealing confidential information?
A) DDoS attack
B) Phishing attack
C) SQL injection
D) Man-in-the-middle attack
18. Which of the following would you use to securely store passwords in a
system?
20. What type of system is commonly used for monitoring security cameras
remotely?
A) WPA2 encryption
B) Using default router passwords
C) Disabling antivirus software
D) Disabling the firewall
A) Hardware failure
B) Regular system updates
C) Authorized employee access
D) Strong encryption protocols
23. Which of the following is a tool used for monitoring network security events?
A) Firewall
B) Intrusion Prevention System (IPS)
C) Microwave oven
D) Database server
24. Which is the safest method for storing sensitive customer information?
A) Employee salaries
B) Emergency exits
C) User account permissions
D) Internet speed
A) DDoS attack
B) Man-in-the-middle attack
C) Phishing
D) SQL injection
A) Encrypting emails
B) Fire suppression systems
C) Using strong passwords
D) Regular system updates
Answer: A) A vulnerability that is exploited before the software vendor releases a fix
A) Data encryption
B) Increased internet speed
C) High-quality printers
D) Public Wi-Fi networks
45. Which of the following security threats is often caused by human error or
negligence?
A) Phishing attacks
B) Malware
C) DDoS attacks
D) Natural disasters
Answer: B) To grant users the minimum level of access necessary for their tasks