Search Header Logo
SecPlus_Quiz_Review

SecPlus_Quiz_Review

Assessment

Presentation

Computers

11th Grade

Practice Problem

Hard

Created by

Brandi Nguyen

FREE Resource

14 Slides • 7 Questions

1

media

2

media

3

Multiple Choice

A security manager is assessing the potential financial impact of a cyberattack on critical company data. The manager determines that a breach could result in a 50% loss of asset value. What metric is being used?

1

ALE — Annual Loss Expectancy

2

SLE — Single Loss Expectancy

3

EF — Exposure Factor

4

ARO — Annualized Rate of Occurrence

4

media

5

media

6

Multiple Choice

A cloud security team is concerned about attackers using stolen credentials to access resources. What control can detect and block suspicious login attempts?


1

A.  Secure Boot

2

B.  IPS — Intrusion Prevention System


3

C.  TLS — Transport Layer Security


4

D.  Conditional Access Policies


7

media

8

media

9

Multiple Choice

A security operations center (SOC) analyst is overwhelmed by the high volume of security alerts. What strategy would help mitigate this issue?


1

Removing all automated alerting


2

Assigning a dedicated team for high-volume alerts


3

Increasing the alert thresholds

4

Disabling SIEM logging

10

media

11

media

12

Multiple Choice

A security engineer wants to protect a cloud environment from compromised accounts. What security measure should be implemented?

1

Conditional Access Policies

2

Patch Management

3

One-Time Passwords (OTP)

4

Secure Email Gateway

13

media

14

media

15

Multiple Choice

A SIEM system needs to track failed login attempts across multiple devices using firewall logs to detect a brute-force attack. What technique should be used?

1

Network Segmentation

2

Log Aggregation

3

Data Obfuscation

4

Log Correlation

16

media

17

Multiple Choice

What is the correct answer for the function that analyzes relationships and patterns across multiple log sources?

1

A. Network Segmentation

2

B. Log Aggregation

3

C. Data Obfuscation

4

D. Log Correlation

18

media

19

Multiple Choice

A security administrator needs to enforce a policy preventing unauthorized data uploads to external websites. What should they implement?

1

A.  Secure File Transfer Protocol (SFTP)

2

B.  Virtual Private Network (VPN) Enforcement

3

C.  Web Content Filtering

4

D.  Cloud DLP — Data Loss Prevention

20

media

21

media
media

Show answer

Auto Play

Slide 1 / 21

SLIDE