security+ (601)

security+ (601)

9th Grade - Professional Development

15 Qs

quiz-placeholder

Similar activities

UNIT 1.8 ELCE

UNIT 1.8 ELCE

10th Grade

14 Qs

Access - Lesson 14

Access - Lesson 14

9th - 12th Grade

10 Qs

ICT 10 : Introduction to Adobe Illustrator(CS5)

ICT 10 : Introduction to Adobe Illustrator(CS5)

10th Grade

10 Qs

مراجعة حاسب2 ثلاث وحدات

مراجعة حاسب2 ثلاث وحدات

11th Grade

16 Qs

Computer Science - X

Computer Science - X

8th - 10th Grade

20 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

CCEA Digital Technology Chapter 14 Multimedia Applications

CCEA Digital Technology Chapter 14 Multimedia Applications

11th Grade

20 Qs

Què en saps de GSuite?

Què en saps de GSuite?

University - Professional Development

10 Qs

security+ (601)

security+ (601)

Assessment

Quiz

Computers

9th Grade - Professional Development

Medium

Created by

J H

Used 135+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A security administrator is collecting information associated with a ransomware infection on the company's web servers. Which of the following log files would provide information regarding the memory contents of these servers?

Web

Packet

Dump

DNS

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which part of the PC startup process verifies the digital signature of the

OS kernel?

Measured Boot

Trusted Boot

Secure Boot

POST

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of these best describes two-factor authentication?

A printer uses a password and a PIN

The door to a building requires a fingerprint scan

An application requires a TOTP code

A Windows Domain requires a username, password, and a smart card

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

• The company does not have a way to manage the mobile devices

in the field

• Company data on mobile devices in the field introduces additional risk

• Team members have many different kinds of mobile devices

Which of the following deployment models would address

these concerns?

Corporate-owned

COPE

VDI

BYOD

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

An organization is installing a UPS for their new data center. Which of

the following would BEST describe this type of control?

Compensation

Preventive

Administrative

Detective

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A manufacturing company would like to track the progress of parts as

they are used on an assembly line. Which of the following technologies

would be the BEST choice for this task?

Quantum computing

Blockchain

Hashing

Asymmetric encryption

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A security administrator has been asked to respond to a potential security

breach of the company’s databases, and they need to gather the most

volatile data before powering down the database servers. In which order

should they collect this information?

CPU registers, temporary files, memory, remote monitoring data

Memory, CPU registers, remote monitoring data, temporary files

Memory, CPU registers, remote monitoring data, remote monitoring data

CPU registers, memory, temporary file, remote monitoring data

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers