Security+ 211-240

Security+ 211-240

Professional Development

30 Qs

quiz-placeholder

Similar activities

Seberapa IT Saya ?

Seberapa IT Saya ?

Professional Development

25 Qs

Estructura Salarial

Estructura Salarial

Professional Development

25 Qs

FR-MPA.06-Network Administrator Madya (TEORI)

FR-MPA.06-Network Administrator Madya (TEORI)

University - Professional Development

25 Qs

İnformatika Qəbul DİM 1

İnformatika Qəbul DİM 1

Professional Development

25 Qs

Ciência de Dados -  Informações e Dados

Ciência de Dados - Informações e Dados

Professional Development

25 Qs

CERI-ITLA

CERI-ITLA

10th Grade - Professional Development

25 Qs

FUNCTIONS - FILES - OOPs CONCEPTS

FUNCTIONS - FILES - OOPs CONCEPTS

Professional Development

25 Qs

WEB_qrup_imtahan_IT_1

WEB_qrup_imtahan_IT_1

Professional Development

25 Qs

Security+ 211-240

Security+ 211-240

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

Hacker Eurotech

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

211) An end user reports a computer has been acting slower than normal for a few weeks, Duringan investigation, an analyst determines the system 3 sending the users email address and a ten-digitnumber ta an IP address once a day. The only resent log entry regarding the user's computer is thefollowing:

Which of the following is the MOST likely cause of the issue?

The end user purchased and installed 2 PUP from a web browser

4 bot on the computer is rule forcing passwords against a website

A hacker Is attempting to exfilltrated sensitive data

Ransomwere is communicating with a command-and-control server.

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

212) A network engineer needs to create a plan for upgrading the wireless infrastructure in alarge office Priority must be given to areas that are currently experiencing latency and connectionissues. Which of the following would be the BEST resource for determining the order of priority?

Nmapn

Heat maps

Network diagrams

Wireshark

Answer explanation

engineer needs to create a plan for upgrading the wireless infrastructure in a large office. Prioritymust be given to areas that are currently.Site surveys and heat maps provide the following benefits: Identify trouble areas to help eliminateslows speeds and poor performanc

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

213) Which of the following BEST describes the MFA attribute that requires a callback on apredefined landline?

Something you exhibit

Something you can do

Someone you know

Somewhere you are

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

214) Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?

Common Weakness Enumeration

OSINT

Dark web

Vulnerability databases

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

215) Which of the following would cause a Chief Information Security Officer (CISO) the MOST concern regarding newly installed Internet-accessible 4K surveillance cameras?

An inability to monitor 100%, of every facility could expose the company to unnecessary risk.

The cameras could be compromised if not patched in a timely manner.

Physical security at the facility may not protect the cameras from theft

Exported videos may take up excessive space on the file servers

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

216) An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?

TLS

PFS

ESP

AH

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

217) A security auditor is reviewing vulnerability scan data provided by an internal security team.Which of the following BEST indicates that valid credentials were used?

The scan results show open ports, protocols, and services exposed on the target hos

The scan enumerated software versions of installed programs

The scan produced a list of vulnerabilities on the target host

The scan identified expired SSL certificates

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?