401-460

401-460

University

57 Qs

quiz-placeholder

Similar activities

Simulado_Python_ADS

Simulado_Python_ADS

University

52 Qs

PROTOCOLOS-1-ESPAÑOL

PROTOCOLOS-1-ESPAÑOL

University - Professional Development

52 Qs

Artificial Intelligence_B.Tech

Artificial Intelligence_B.Tech

University

60 Qs

Network Media

Network Media

University

62 Qs

ITSM Practice Exam

ITSM Practice Exam

University

57 Qs

DIMA 223 Final Exam (Digital Marketing)

DIMA 223 Final Exam (Digital Marketing)

12th Grade - University

53 Qs

TIN6_ÔN TẬP HKI_2425

TIN6_ÔN TẬP HKI_2425

6th Grade - University

60 Qs

Network Models

Network Models

University

60 Qs

401-460

401-460

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

beyza avci

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

57 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.401 Which of the following represents a biometric FRR?

A. Authorized users being denied access

B. Users failing to enter the correct PIN

C. The denied and authorized numbers being equal

D. The number of unauthorized users being granted access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.402 During a security assessment, a security finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permission for the existing users and groups and remove the set-user-ID from the file?

A. 1a

B. chflags

C. chmod

D. leof

E. setuid

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.403 When implementing automation with loT devices, which of the following should be considered FIRST to keep the network secure?

A. Z-Wave compatibility

B. Network range

C. Zigbee configuration

D. Communication protocols

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.404 Which of the following describes the ability of code to target a hypervisor from inside

A. Fog computing

B. VM escape

C. Software-defined networking

D. Image forgery

E. Container breakout

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.405 Users at organization have been installing programs from the internet on their workstations without first proper authorization. The organization maintains a portal from which users can install standardized programs. However, some users have administrative access on their workstations to enable legacy programs to function property. Which of the following should the security administrator consider implementing to address this issue?

A. Application code signing

B. Application whitellsting

C. Data loss prevention

D. Web application firewalls

Answer explanation

Explanation Application whitelisting is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system. The goal of whitelisting is to protect computers and networks from potentially harmful applications. In general, a whitelist is an index of approved entities. In information security (infosec), whitelisting works best in centrally managed environments, where systems are subject to a consistent workload.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.406 A company is implementing a new SIEM to log and send alerts whenever malicious activity is blocked by its antivirus and web content filters. Which of the following is the primary use case for this scenario?

A. Implementation of preventive controls

B. Implementation of detective controls

C. Implementation of deterrent controls

D. Implementation of corrective controls

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.407 Which of the following types of controls is a CCTV camera that is not being monitored?

A. Detective

B. Deterrent

C. Physical

D. Preventive

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?