security+ (601)

security+ (601)

9th Grade - Professional Development

15 Qs

quiz-placeholder

Similar activities

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

12th Grade

14 Qs

RAM and ROM

RAM and ROM

11th Grade

15 Qs

OCR J277 1.1.2 CPU Performance Factors

OCR J277 1.1.2 CPU Performance Factors

10th Grade

15 Qs

Computer Architecture Quiz - LECTURE

Computer Architecture Quiz - LECTURE

University

20 Qs

MOVIE

MOVIE

11th Grade

10 Qs

ARM BASICS Module 1

ARM BASICS Module 1

University

10 Qs

CPU Components and FDE Cycle

CPU Components and FDE Cycle

9th - 11th Grade

15 Qs

OCR J277 1.1 Systems Architecture

OCR J277 1.1 Systems Architecture

10th - 11th Grade

20 Qs

security+ (601)

security+ (601)

Assessment

Quiz

Computers

9th Grade - Professional Development

Medium

Created by

J H

Used 135+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A security administrator is collecting information associated with a ransomware infection on the company's web servers. Which of the following log files would provide information regarding the memory contents of these servers?

Web

Packet

Dump

DNS

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which part of the PC startup process verifies the digital signature of the

OS kernel?

Measured Boot

Trusted Boot

Secure Boot

POST

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of these best describes two-factor authentication?

A printer uses a password and a PIN

The door to a building requires a fingerprint scan

An application requires a TOTP code

A Windows Domain requires a username, password, and a smart card

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

• The company does not have a way to manage the mobile devices

in the field

• Company data on mobile devices in the field introduces additional risk

• Team members have many different kinds of mobile devices

Which of the following deployment models would address

these concerns?

Corporate-owned

COPE

VDI

BYOD

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

An organization is installing a UPS for their new data center. Which of

the following would BEST describe this type of control?

Compensation

Preventive

Administrative

Detective

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A manufacturing company would like to track the progress of parts as

they are used on an assembly line. Which of the following technologies

would be the BEST choice for this task?

Quantum computing

Blockchain

Hashing

Asymmetric encryption

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A security administrator has been asked to respond to a potential security

breach of the company’s databases, and they need to gather the most

volatile data before powering down the database servers. In which order

should they collect this information?

CPU registers, temporary files, memory, remote monitoring data

Memory, CPU registers, remote monitoring data, temporary files

Memory, CPU registers, remote monitoring data, remote monitoring data

CPU registers, memory, temporary file, remote monitoring data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?