Security+ Day 11

Security+ Day 11

Professional Development

5 Qs

quiz-placeholder

Similar activities

AWS ACF Módulo 1  - Visão geral dos conceitos de nuvem

AWS ACF Módulo 1 - Visão geral dos conceitos de nuvem

Professional Development

10 Qs

Driver Installations

Driver Installations

Professional Development

10 Qs

Ai BG-Q#

Ai BG-Q#

Professional Development

10 Qs

Solar System -Pencil 2D

Solar System -Pencil 2D

KG - Professional Development

10 Qs

Azure Cloud computing

Azure Cloud computing

Professional Development

10 Qs

C String Array MCQs

C String Array MCQs

Professional Development

10 Qs

Unix Fundamentals

Unix Fundamentals

Professional Development

10 Qs

How are you doing?

How are you doing?

Professional Development

10 Qs

Security+ Day 11

Security+ Day 11

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Nina Rosario

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a situation where your organization points you to approved mobile device manufacturers for work use?

BYOD

COBO

COPE

CYOD

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions

would BEST support the policy?

Mobile Device Management

Full-Device Encryption

Remote Wipe

Biometrics

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?

The theft of portable electronic devices

Geotagging in the metadata of images

Bluesnarfing of mobile devices

Data exfiltration over a mobile hotspot

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious individual is attempting to write too much data to an application’s memory. Which of the following describes this type of attack?

Zero-day

SQL injection

Buffer overflow

XSRF XSRF

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What port number would you need to Allow on your firewall for DNS queries?

53

B.

C.

D.

68

389

25