Search Header Logo

Security+ Qs 271-543

Computers

University

Used 119+ times

Security+ Qs 271-543
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

273 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a recent audit, it was discovered that several user accounts belonging to former employees were still active and had valid VPN permissions.

Which of the following would help reduce the amount of risk the organization incurs in this situation in the future?

Time-of-day restrictions

User access reviews

Group-based privileges

Change management policies

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is working with a cloud services provider to transition critical business applications

to a hybrid cloud environment. The organization retains sensitive customer data and wants to

ensure the provider has sufficient administrative and logical controls in place to protect its data.


In which of the following documents would this concern MOST likely be addressed?

Service level agreement

Interconnection security agreement

Non-disclosure agreement

Business process analysis

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator wants to implement a company-wide policy to empower data owners to manage and enforce access control rules on various resources.

Which of the following should be implemented?

Mandatory access control

Discretionary access control

Role based access control

Rule based access control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST describes an attack where communications between two parties are intercepted and forwarded to each party with neither party being aware of the interception and potential modification to the communications?

Spear phishing

Main-in-the-middle

URL hijacking

Tansitive access

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A security administrator wishes to implement a secure a method of file transfer when communicating with outside organizations.


Which of the following protocols would BEST facilitate secure file transfers? (Select TWO)

SCP

TFTP

SNMP

FTP

FTPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician needs to implement a system which will properly authenticate users by their username and password only when the users are logging in from a computer in the office building. Any attempt to authenticate from a location other than the office building should be rejected.


Which of the following MUST the technician implement?

Dual factor authentication

Transitive authentication

Single factor authentication

Biometric authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After correctly configuring a new wireless enabled thermostat to control the temperature of the company's meeting room, Joe, a network administrator determines that the thermostat is not connecting to the internet-based control system. Joe verifies that the thermostat received the expected network parameters and it is associated with the AP. Additionally, the other wireless mobile devices connected to the same wireless network are functioning properly. The network administrator verified that the thermostat works when tested at his residence.


Which of the following is the MOST likely reason the thermostat is not connecting to the internet?

The company implements a captive portal

The thermostat is using the incorrect encryption algorithm

the WPA2 shared likely is incorrect

The company's DHCP server scope is full

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?