security+ (601)
Quiz
•
Computers
•
9th Grade - Professional Development
•
Medium
J H
Used 135+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
A security administrator is collecting information associated with a ransomware infection on the company's web servers. Which of the following log files would provide information regarding the memory contents of these servers?
Web
Packet
Dump
DNS
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which part of the PC startup process verifies the digital signature of the
OS kernel?
Measured Boot
Trusted Boot
Secure Boot
POST
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of these best describes two-factor authentication?
A printer uses a password and a PIN
The door to a building requires a fingerprint scan
An application requires a TOTP code
A Windows Domain requires a username, password, and a smart card
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
• The company does not have a way to manage the mobile devices
in the field
• Company data on mobile devices in the field introduces additional risk
• Team members have many different kinds of mobile devices
Which of the following deployment models would address
these concerns?
Corporate-owned
COPE
VDI
BYOD
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
An organization is installing a UPS for their new data center. Which of
the following would BEST describe this type of control?
Compensation
Preventive
Administrative
Detective
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
A manufacturing company would like to track the progress of parts as
they are used on an assembly line. Which of the following technologies
would be the BEST choice for this task?
Quantum computing
Blockchain
Hashing
Asymmetric encryption
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
A security administrator has been asked to respond to a potential security
breach of the company’s databases, and they need to gather the most
volatile data before powering down the database servers. In which order
should they collect this information?
CPU registers, temporary files, memory, remote monitoring data
Memory, CPU registers, remote monitoring data, temporary files
Memory, CPU registers, remote monitoring data, remote monitoring data
CPU registers, memory, temporary file, remote monitoring data
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
19 questions
UNIT 1.2 MEMORY
Quiz
•
10th Grade
10 questions
Adobe Photoshop
Quiz
•
University
12 questions
Examen final algoritmo
Quiz
•
11th Grade
20 questions
REMEDI PAS - DESAIN DAN KOMP. GRAFIS
Quiz
•
12th Grade
10 questions
UX Design
Quiz
•
University
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
18 questions
Memory-Mobo-Hard/Software
Quiz
•
University
20 questions
1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni
Quiz
•
University - Professi...
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
