Comp_Sec_361-390

Comp_Sec_361-390

KG

30 Qs

quiz-placeholder

Similar activities

Literatura realista

Literatura realista

Professional Development

25 Qs

UTS Gizi & Diet

UTS Gizi & Diet

University

25 Qs

Uso de la CSZ

Uso de la CSZ

4th Grade

30 Qs

Technika klasa 4 - rower

Technika klasa 4 - rower

1st - 4th Grade

30 Qs

MAPEH 9_QUIZ 3

MAPEH 9_QUIZ 3

9th Grade

25 Qs

Teks Cerita Imajinasi

Teks Cerita Imajinasi

7th Grade

25 Qs

Tema 5 Subtema 2

Tema 5 Subtema 2

3rd Grade

25 Qs

PTS Genap_TEMA 6 bagian 1

PTS Genap_TEMA 6 bagian 1

5th Grade

25 Qs

Comp_Sec_361-390

Comp_Sec_361-390

Assessment

Quiz

Other

KG

Practice Problem

Easy

Created by

Hacker Eurotech

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

NO.361 A security analyst is investigating multiple hosts that are communicating to external IP addresses during the hours of 2:00 a.m - 4:00 am. The malware has evaded detection by traditional antivirus software. Which of the following types of malware is MOST likely infecting the hosts?

A RAT

Ransomware

Logic bomb

A worm

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

NO.362 A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboars are cleaned and all desks are cleared. The company is MOST likely trying to protect against.

Loss of proprietary information

Damage to the company's reputation

Social engineering

Credential exposure

Answer explanation

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information think phishing, spoofing. That is not being demonstrated in this question. The company is protecting themselves from loss of proprietary information by clearing it all out. so that if anyone in the tour is looking to take it they will be out of luck

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

NO.363 A desktop support technician recently installed a new document-scanning software program on a computer However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?

A new firewall rule is needed to access the application.

The system was quarantined for missing software updates

The software was not added to the application whitelist.

The system was isolated from the network due to infected software.

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

NO.364 Users reported several suspicious activities within the last two weeks that resulted in several unauthorized transactions. Upon investigation, the security analyst found the following: Multiple reports of breached credentials within that time period Traffic being redirected in certain parts of the network * Fraudulent emails being sent by various internal users without their consent Which of the following types of attacks was MOST likely used?

Replay attack

Race condition

Cross site scripting

Request forgeries

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

NO.365 An organization recently acquired an ISO 27001 certification. Which of the following would MOST likely be considered a benefit of this certification?

It allows for the sharing of digital forensics data across organizations

It provides insurance in case of a data breach

It provides complimentary training and certification resources to IT security staff.

It certifies the organization can work with foreign entities that require a security clearance

It assures customers that the organization meets security standards

Answer explanation

According to the ISO https://www.iso.org/standard/54534.html ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all organizations, regardless of type, size or nature.

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

NO.366 A security analyst is configuring a large number of new company-issued laptops. The analyst received the following requirements:

* The devices will be used internationally by staff who travel extensively.

*Occasional personal use is acceptable due to the travel requirements.

*Users must be able to install and configure sanctioned programs and productivity suites.

*The devices must be encrypted

* The devices must be capable of operating in low-bandwidth environments.

Which of the following would provide the GREATEST benefit to the security posture of the devices?

Configuring an always-on VPN

Implementing application whitelisting

Requiring web traffic to pass through the on-premises content filter

Setting the antivirus DAT update schedule to weekly

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

NO.367 A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB network protocol to rapidly infect computers. Once infected, computers are encrypted and held for ransom. Which of the following would BEST prevent this attack from reoccurring?

Configure the perimeter firewall to deny inbound external connections to SMB ports.

Ensure endpoint detection and response systems are alerting on suspicious SMB connections.

Deny unauthenticated users access to shared network folders.

Verify computers are set to install monthly operating system, updates automatically.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?