SEC+2020 PART 1

SEC+2020 PART 1

University

26 Qs

quiz-placeholder

Similar activities

Module 4A. Post-Exploitation - Linux Local Enumeration

Module 4A. Post-Exploitation - Linux Local Enumeration

University

21 Qs

Mircrosoft Server Admin 98-365

Mircrosoft Server Admin 98-365

KG - Professional Development

24 Qs

Module 4B. Post-Exploitation - Linux Privilege Escalation

Module 4B. Post-Exploitation - Linux Privilege Escalation

University

22 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

25 Qs

Microsoft Server Admin 98-365 Part 3

Microsoft Server Admin 98-365 Part 3

KG - Professional Development

22 Qs

14) 2011.1 Using e-mail servers

14) 2011.1 Using e-mail servers

University

28 Qs

Module 3 - Security Architecture

Module 3 - Security Architecture

University

25 Qs

Computer Security

Computer Security

University

21 Qs

SEC+2020 PART 1

SEC+2020 PART 1

Assessment

Quiz

Computers

University

Hard

Created by

Yareli Hunsucker

Used 10+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

An organization is developing its mobile device management policies and is concerned about vulnerabilities that are associated with sensitive data being saved to a mobile device, as well as weak authentication when using a PIN. As part of some discussion on the topic, several solutions are proposed. Which of the following controls, when required together, will address the protection of data at rest as well as strong authentication? (Select TWO)

Containerization

FDE

Remote wipe capbility

MDB

MFA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Renew the DNS settings on the employee computer

Add the employee to a less restrictive group on the content filter

Remove the proxy settings from the employees computer

Create an exception for the job search site in the host-based firewall on the employees computer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is mitigating a pass- the- hash vulnerability on a windows infrastructure. Given the requirement , which of the following should the security analyst do to MINIMIZE the risk?

Enable CHAP

Disable MD5

Enable Kerboros

Disable PAP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

LDAP

RADIUS

SAML

NTLM

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is considered something you do. (Select TWO)

Iris Scan

Handwriting

Common Access Card

GAIT

PIN

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Changing the account standard naming convention.

Implementing account lockouts

Discontinuing the use of privileged accounts

Increasing the minimum password length from eight to ten characters.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The HTTP POST method is not protected by HTTPS

The web server is running a vulnerable SSL configuration

The company does not support DNSECC

The HTTP response is susceptible to sniffing.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?