
401-460
Authored by beyza avci
Computers
University
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
57 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.401 Which of the following represents a biometric FRR?
A. Authorized users being denied access
B. Users failing to enter the correct PIN
C. The denied and authorized numbers being equal
D. The number of unauthorized users being granted access
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.402 During a security assessment, a security finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permission for the existing users and groups and remove the set-user-ID from the file?
A. 1a
B. chflags
C. chmod
D. leof
E. setuid
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.403 When implementing automation with loT devices, which of the following should be considered FIRST to keep the network secure?
A. Z-Wave compatibility
B. Network range
C. Zigbee configuration
D. Communication protocols
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.404 Which of the following describes the ability of code to target a hypervisor from inside
A. Fog computing
B. VM escape
C. Software-defined networking
D. Image forgery
E. Container breakout
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.405 Users at organization have been installing programs from the internet on their workstations without first proper authorization. The organization maintains a portal from which users can install standardized programs. However, some users have administrative access on their workstations to enable legacy programs to function property. Which of the following should the security administrator consider implementing to address this issue?
A. Application code signing
B. Application whitellsting
C. Data loss prevention
D. Web application firewalls
Answer explanation
Explanation Application whitelisting is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system. The goal of whitelisting is to protect computers and networks from potentially harmful applications. In general, a whitelist is an index of approved entities. In information security (infosec), whitelisting works best in centrally managed environments, where systems are subject to a consistent workload.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.406 A company is implementing a new SIEM to log and send alerts whenever malicious activity is blocked by its antivirus and web content filters. Which of the following is the primary use case for this scenario?
A. Implementation of preventive controls
B. Implementation of detective controls
C. Implementation of deterrent controls
D. Implementation of corrective controls
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.407 Which of the following types of controls is a CCTV camera that is not being monitored?
A. Detective
B. Deterrent
C. Physical
D. Preventive
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
60 questions
IC3_GS6_LV2
Quiz
•
7th Grade - University
53 questions
UTS Struktur Data
Quiz
•
University
55 questions
NETWORK HARDWARE
Quiz
•
University - Professi...
60 questions
FDS_MIDTERM
Quiz
•
University
60 questions
IoT_Midterm
Quiz
•
University
61 questions
PC HARDWARE
Quiz
•
University
55 questions
SAINS KOMPUTER TINGKATAN 4
Quiz
•
12th Grade - University
60 questions
TIN 6- CÂU HỎI ÔN TẬP GK1
Quiz
•
6th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade