Search Header Logo

401-460

Authored by beyza avci

Computers

University

Used 9+ times

401-460
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

57 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.401 Which of the following represents a biometric FRR?

A. Authorized users being denied access

B. Users failing to enter the correct PIN

C. The denied and authorized numbers being equal

D. The number of unauthorized users being granted access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.402 During a security assessment, a security finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permission for the existing users and groups and remove the set-user-ID from the file?

A. 1a

B. chflags

C. chmod

D. leof

E. setuid

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.403 When implementing automation with loT devices, which of the following should be considered FIRST to keep the network secure?

A. Z-Wave compatibility

B. Network range

C. Zigbee configuration

D. Communication protocols

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.404 Which of the following describes the ability of code to target a hypervisor from inside

A. Fog computing

B. VM escape

C. Software-defined networking

D. Image forgery

E. Container breakout

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.405 Users at organization have been installing programs from the internet on their workstations without first proper authorization. The organization maintains a portal from which users can install standardized programs. However, some users have administrative access on their workstations to enable legacy programs to function property. Which of the following should the security administrator consider implementing to address this issue?

A. Application code signing

B. Application whitellsting

C. Data loss prevention

D. Web application firewalls

Answer explanation

Explanation Application whitelisting is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system. The goal of whitelisting is to protect computers and networks from potentially harmful applications. In general, a whitelist is an index of approved entities. In information security (infosec), whitelisting works best in centrally managed environments, where systems are subject to a consistent workload.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.406 A company is implementing a new SIEM to log and send alerts whenever malicious activity is blocked by its antivirus and web content filters. Which of the following is the primary use case for this scenario?

A. Implementation of preventive controls

B. Implementation of detective controls

C. Implementation of deterrent controls

D. Implementation of corrective controls

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.407 Which of the following types of controls is a CCTV camera that is not being monitored?

A. Detective

B. Deterrent

C. Physical

D. Preventive

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?